Analysis

  • max time kernel
    177s
  • max time network
    190s
  • platform
    android_x64
  • resource
    android-x64-20240624-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system
  • submitted
    11-08-2024 22:13

General

  • Target

    c319c481abe16c06fadbd31895c3239b3d5bbdd5389bfbd1f3fe54d2fa6cb9fd.apk

  • Size

    4.3MB

  • MD5

    642bc64883f419e4da9aaec0518ddbe9

  • SHA1

    ffdb3415b3ed61d72c0da68bf792c2fc76b383f3

  • SHA256

    c319c481abe16c06fadbd31895c3239b3d5bbdd5389bfbd1f3fe54d2fa6cb9fd

  • SHA512

    a62e1bfb62ad3ec205c4ed487f3204b2193e8cba1e39d9fcf0f2d3434bc8d4bf4641bced81a7c51cb524ba55e6158da63a9b94d11b3cef20365f99a1b70fed05

  • SSDEEP

    98304:u39MrSRWTOfpcU/lSLMFQSjpio7jKhpqR8N1twQ52irho/Ck:uGrElfphldFQSjpio7jKhpIS3wQwi1cJ

Malware Config

Extracted

Family

hook

C2

http://193.3.19.40

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.tolgfawjd.udvhnorih
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4938

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.tolgfawjd.udvhnorih/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    d7808eb3fb72e10b7452bed09f8819a9

    SHA1

    a40ecee5ff82c8cf7fac18240ecd35e7479a63b6

    SHA256

    5acf2a01f9bf9b77abea6d4660d2b82359ad7662ed8a52ca754255ca03ef84f3

    SHA512

    26027aaef3b04779f887e6b4ffdba5561ae267ad318affe5c1850f44613e5ae39e84cc561c784200de639714c28bfb5690d1dd7d28795e43463883bd10f06e1b

  • /data/data/com.tolgfawjd.udvhnorih/cache/classes.dex

    Filesize

    1.0MB

    MD5

    ffececa77f79db9048f83ce325d9f62b

    SHA1

    c42d2c369b5216f9664950aeeeef319a67afde92

    SHA256

    1274d10aec34c00d1d7e667981e7e462a42f3b04b9af85bff4b742ba9f4dd453

    SHA512

    7f999de898e77b33a0175bc68019f029c4c247409467723444cb3a5ec36b67c0088ded49a477b44b7396f28000dea3d63e986dfa0a23be20ac1c133c4dd3a433

  • /data/data/com.tolgfawjd.udvhnorih/cache/classes.zip

    Filesize

    1.0MB

    MD5

    347804d3d7aacb1170572eddad2af2dd

    SHA1

    0360fc59ea9d5467b0f44cc11f68287f1265a1db

    SHA256

    372cb01ddb9131499e8d179bba1560eaa1e1109f50fbaaf7b281210262b599ec

    SHA512

    fba6766515a22fbf564eda3406ddb52a08e87497f4cf1c42270897fdaf94624c458dcae55337f565f951e4d2c0bb0fa8ef4b03123fc8d9cc715dddff98c0bcd4

  • /data/data/com.tolgfawjd.udvhnorih/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.tolgfawjd.udvhnorih/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    3f2e5ebc8e635a300faaf36a34f91ada

    SHA1

    d0e09210b6619986101a7358198f550d246929b2

    SHA256

    401a17631ac7f368335d33677ac122d516920a28703ec38b4b32d6d309aca15d

    SHA512

    645ccf3456eb0e870b9cf739076ed2240cf9bf3cbc7ff1ce699ec98d31b9c2f07452ce4023a4625f8beb8f7487b46709dea7e3e2a65da2b4626d8bac8e8fb723

  • /data/data/com.tolgfawjd.udvhnorih/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.tolgfawjd.udvhnorih/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    a64b75c31a72c33ee50770ea9f2c4fb3

    SHA1

    11f48d3c5790d944810db0cd362a50f9c20885d8

    SHA256

    1c53490b9cc5813cda3899d4a27c3ed05ddf7cca14473ef8d81326749f3f5bf9

    SHA512

    ffe872c9517f0fb15e48069263d97095da81acae9ed3881d4395bdb38cefa8c64a19a5a73c8bfaaf3bc7c9d860e3446affcd3067962e00da412b5d1dcb82e463

  • /data/data/com.tolgfawjd.udvhnorih/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    a75e0477d9814854c4bf8ca48c9a0f9e

    SHA1

    7858078ce220faaba5f8f7e8d62b3e8b73be072a

    SHA256

    c797d71766cd89715f7d7c195b44d2f7afcf2bfd2535614fb63cabe1cec67175

    SHA512

    741ede98b9286136d213d88bab6c7aba215ea76b2e7e282c6610de283042700ee2bcf37dd9e5d90517ea98293ba37a08f5c875a6f33275349d5971e19c4843dc

  • /data/data/com.tolgfawjd.udvhnorih/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    7b0c19aaa0bba7701848607baf2c48f0

    SHA1

    4f0df263e8df71a9deca81a0105d92ca9259a80c

    SHA256

    c5399041d1565b172d5634268183fea90da4379a60eb28f4e984190e3ef5a17f

    SHA512

    607764be9f8c7060851f8e91bcdea1fdbd144e44648736daaf0cefd1e852b1a2d5f4d7299251471a3bd9f92926ce6d542d53a5fa23c8becef07cecce1e526ca3