Analysis

  • max time kernel
    177s
  • max time network
    182s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    11-08-2024 22:15

General

  • Target

    3323c7593b7eda2072d4261b51b64b9202974030538cb3c56e295bcab309f22f.apk

  • Size

    1.1MB

  • MD5

    fe0d77d876dbb4f4fb037ed94abccb28

  • SHA1

    778504b97e7455f2cf8bc6c186d22ec38d8bcc55

  • SHA256

    3323c7593b7eda2072d4261b51b64b9202974030538cb3c56e295bcab309f22f

  • SHA512

    07da1e84e7975d25f458444da9e5cee5143313ebd2546d1bce0e58010bc5fb6ad81b91f2ee69422f2b45ba1ceba4a8ed9459d04187fb320828f270a6448470eb

  • SSDEEP

    24576:AT+yMCzf7l/YrP3B7mH7A3Yt5futogojyllg/Gq7tN:8bf7tYrPRy7A3MfNgXllg/hN

Malware Config

Extracted

Family

hook

C2

http://wispy-pine-99659.pktriot.net:22284

AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Reads information about phone network operator. 1 TTPs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.dinizetawazeza.likeya
    1⤵
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Queries information about the current Wi-Fi connection
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4637

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.dinizetawazeza.likeya/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/user/0/com.dinizetawazeza.likeya/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    6d777e27b4a9b135ebb501931eb3ecd0

    SHA1

    c761ce1c750e2d41ba5dce1e5e92a86ec7651718

    SHA256

    c2c42292d7582828fcf48744ae85ed38ad0e82ebf10eb760347a58404f9ebb01

    SHA512

    140aff4bfdec9323364bcfb975c8dcadb18f25952dfeb34fb1b96ab65acaf4495001832f9f1ee0f98ead4c3e52a88e77fb24de2d34466bcde51bd03d0fc96ac8

  • /data/user/0/com.dinizetawazeza.likeya/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/user/0/com.dinizetawazeza.likeya/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    0023f6661f68f80e976aefd9ce3d5e3f

    SHA1

    307b0971f4eee9f62dc3bbec3c42beb4f510cf20

    SHA256

    af03689ed85f8cd70bcd3d7b3de270ea68f5207dd8f488f40779a2854214dd20

    SHA512

    4f721ecaa475278803fa04bd3aa6266c156000f6e04fdb52dad10a7ac9918f89fe21fe7bea2e192248b34982b609d7affa4b67954d84a1fd8e65989eec5c3522

  • /data/user/0/com.dinizetawazeza.likeya/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    140be9c352986b8b2555736742a9dd14

    SHA1

    f483da76285043941a6806c348a16b8f891e75c6

    SHA256

    2aa620493a59d00c00e7fb2f4b2e220fa7b00169ec96a3dd2e9dfc193ecf7b91

    SHA512

    24c7c59b18746ff107e3075dc0059eac9e74a8f8bc3a6cd5e3f4d73c5477ab19792c237601804c597080c545444497e52c1cc08028398e18200d6f2a94009267

  • /data/user/0/com.dinizetawazeza.likeya/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    cacd8e205f0838824c20df075e6981c4

    SHA1

    6398cce0df73518780986735827da976070c6ffc

    SHA256

    9233ac078c099fc0c4a3d846223fb7e31320633a4651a0e93a49f5aa06f9bc52

    SHA512

    ec4830d86bfe408b6b53323ee53e7354a5984d8fd42a3d08666f3b5f72218ece63403002d2cfe85b33223e49f943b5f39309d98857d2b333a6121fdf2cdc50ef