Analysis

  • max time kernel
    179s
  • max time network
    190s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    11-08-2024 22:13

General

  • Target

    c319c481abe16c06fadbd31895c3239b3d5bbdd5389bfbd1f3fe54d2fa6cb9fd.apk

  • Size

    4.3MB

  • MD5

    642bc64883f419e4da9aaec0518ddbe9

  • SHA1

    ffdb3415b3ed61d72c0da68bf792c2fc76b383f3

  • SHA256

    c319c481abe16c06fadbd31895c3239b3d5bbdd5389bfbd1f3fe54d2fa6cb9fd

  • SHA512

    a62e1bfb62ad3ec205c4ed487f3204b2193e8cba1e39d9fcf0f2d3434bc8d4bf4641bced81a7c51cb524ba55e6158da63a9b94d11b3cef20365f99a1b70fed05

  • SSDEEP

    98304:u39MrSRWTOfpcU/lSLMFQSjpio7jKhpqR8N1twQ52irho/Ck:uGrElfphldFQSjpio7jKhpIS3wQwi1cJ

Malware Config

Extracted

Family

hook

C2

http://193.3.19.40

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Reads information about phone network operator. 1 TTPs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.tolgfawjd.udvhnorih
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4476

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.tolgfawjd.udvhnorih/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    d7808eb3fb72e10b7452bed09f8819a9

    SHA1

    a40ecee5ff82c8cf7fac18240ecd35e7479a63b6

    SHA256

    5acf2a01f9bf9b77abea6d4660d2b82359ad7662ed8a52ca754255ca03ef84f3

    SHA512

    26027aaef3b04779f887e6b4ffdba5561ae267ad318affe5c1850f44613e5ae39e84cc561c784200de639714c28bfb5690d1dd7d28795e43463883bd10f06e1b

  • /data/data/com.tolgfawjd.udvhnorih/cache/classes.dex

    Filesize

    1.0MB

    MD5

    ffececa77f79db9048f83ce325d9f62b

    SHA1

    c42d2c369b5216f9664950aeeeef319a67afde92

    SHA256

    1274d10aec34c00d1d7e667981e7e462a42f3b04b9af85bff4b742ba9f4dd453

    SHA512

    7f999de898e77b33a0175bc68019f029c4c247409467723444cb3a5ec36b67c0088ded49a477b44b7396f28000dea3d63e986dfa0a23be20ac1c133c4dd3a433

  • /data/data/com.tolgfawjd.udvhnorih/cache/classes.zip

    Filesize

    1.0MB

    MD5

    347804d3d7aacb1170572eddad2af2dd

    SHA1

    0360fc59ea9d5467b0f44cc11f68287f1265a1db

    SHA256

    372cb01ddb9131499e8d179bba1560eaa1e1109f50fbaaf7b281210262b599ec

    SHA512

    fba6766515a22fbf564eda3406ddb52a08e87497f4cf1c42270897fdaf94624c458dcae55337f565f951e4d2c0bb0fa8ef4b03123fc8d9cc715dddff98c0bcd4

  • /data/data/com.tolgfawjd.udvhnorih/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.tolgfawjd.udvhnorih/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    09527961695d46ebc919e265bde7e0de

    SHA1

    f4d9d3a428caa13fed1aa9bd8a96d9b639b7073b

    SHA256

    9f0cbb99ee92486288f6e1ae2939e2bbb5034d3f267e9dee85a25c0cc5e6cead

    SHA512

    b25bd71adb574c9124c4b838186e765ac97c63b2946834aa6d57380161f720f941c00770c4a1f99c5882c093f1bf305ba58b06cd2cef2446692870d97685396e

  • /data/data/com.tolgfawjd.udvhnorih/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.tolgfawjd.udvhnorih/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    512540dfdf7feec4d4e3ddbc4804e36f

    SHA1

    77bc077abecab226530d3118b8357d1916f463d6

    SHA256

    e38ed1c3b0be95c1bf421fbe7a70ec5994d69d2f318daba0a0a63434cbd73b0f

    SHA512

    6b69dce0d0f920ac081d98c1f12c2f72b12f99e9affb4b30f06fecd93b49bec6c64f8c01b3f296189148b430b792b194394c901cc80963973d41a238f97253fb

  • /data/data/com.tolgfawjd.udvhnorih/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    657626a6a8aa14f2208a570365c2dc99

    SHA1

    2d9e8d8f2fd5fdf6c5c3b38114625c00f78ae213

    SHA256

    c134374fa37360e47f7e9e6dd00cf9dd27a07c3fb05ef962fbb0401b0a593a36

    SHA512

    088925f4b7d52c6609680ddc4a3d2c955ac4cd2fbcea645e405412daefa84484e72d68eb4321d2f85731a6434fa8df573ecf62ee30eba18766233d966a85bc63

  • /data/data/com.tolgfawjd.udvhnorih/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    435c0e25f1cead682ae8926b660f6f02

    SHA1

    621a7b52967464b8c1483a2951afc16918e654c7

    SHA256

    6510cacd89be7c9ea72f289758858f6eb1a4a79350e70835201cc404a7acd6ed

    SHA512

    44609b7caafdf5173d333f8e8d4db9f17d700e48b5893a1594bbd95b88069647e1c438ae42a00b85a630e8c506aab3fc98807bba6044927b96171c64d8ece55f