Analysis

  • max time kernel
    178s
  • max time network
    187s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    12-08-2024 22:00

General

  • Target

    826721e53ac786981c5766a9f833b7442e299bdb8dd1d76c8e7306397afd2823.apk

  • Size

    4.3MB

  • MD5

    86e7010b107e25d07da9bbe84e8b55f9

  • SHA1

    eddf5d6aa948db8a2672c60a5c8e6a487c356312

  • SHA256

    826721e53ac786981c5766a9f833b7442e299bdb8dd1d76c8e7306397afd2823

  • SHA512

    b8324fa18c48b1f9883446bc316cb002b58e6d808e9754c61931c9beb46908cdc8f63c0876285cae4f3b03463c209aa1380c481f5fd5fc2506c284491cd4d036

  • SSDEEP

    98304:bVQCQ69BgZIXOOYHDF4SwGW1EQ3pCXi0spAOMlgbKTcBl3Di+L5:bN3XOFI11V3pCy35Ml1SDi+l

Malware Config

Extracted

Family

hook

C2

http://193.3.19.40

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 9 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.cexwolmbn.uonfuxluh
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4322
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.cexwolmbn.uonfuxluh/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.cexwolmbn.uonfuxluh/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4352

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.cexwolmbn.uonfuxluh/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    82a2520fb9c4f29f52cef1686906f4cf

    SHA1

    7462134200ac38643c30c01e4b9755060f3b2e65

    SHA256

    cc607f7828822de776d2f6664245f98f648acd26d8ad563a4df20ba4bcdd76ad

    SHA512

    7cc769058c66ae209ed3de709b1880235f7aa0ae2121a41fcf16d62de07958f27a749ca310a8ba6d03b4c9d23f9168540a5fe662f87b1e3833b78eaea8695ce1

  • /data/data/com.cexwolmbn.uonfuxluh/cache/classes.dex

    Filesize

    1.0MB

    MD5

    ae1b65c9bc777ce41f23f44ce56cf6f3

    SHA1

    cd1bd83510c2daf9362262440a30c53fa04fc301

    SHA256

    759eb20d277a42bfcde4858c882a303081bfcc98f1e161c15a2b00f700223f5c

    SHA512

    19118ceb9b452cff745c1b0397f76597c9ee71df874b09d0146e9e17422ce5ef52e828f6626f17e20aaa40660b34003362fa2b3f52fbbdeef41f2af3196a9933

  • /data/data/com.cexwolmbn.uonfuxluh/cache/classes.zip

    Filesize

    1.0MB

    MD5

    bb3a17855f206e1ae222a5e5391df12d

    SHA1

    21bb7b4ab7f20ee22c85fd1096040ef55db3e847

    SHA256

    a14fd46f618712456c576346d14a16207b2102f8678cc2a1c521ec902e90722e

    SHA512

    deadb406ffa5c4137761e0e3322d4002bd4817efc7dbf2193d706c609dcb26074f072efaa0cd0fd2a148b7f3d9ea833f94e71d2ef2974cfd40f48f26b5a2033b

  • /data/data/com.cexwolmbn.uonfuxluh/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.cexwolmbn.uonfuxluh/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    4e2f72959004eed02ecc5d46f2a43d03

    SHA1

    32cbb3a9ed38c8b4f31eaa2cdb989413c89fd124

    SHA256

    95219dc0e95bbefa26d8f04e6b48a5a82cf68142186175a48714ccf3c6e501e7

    SHA512

    b2ed8a069f44de21b56b67a19f7930131ed350bda8b7271e5a1428d35c6cfe9444767be12d7a64637e706248421fd130f8b09c74765e9407fc6e6529ad1c4316

  • /data/data/com.cexwolmbn.uonfuxluh/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.cexwolmbn.uonfuxluh/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    a9c78a9bc499ff227ef40de43e9fea98

    SHA1

    194f564ee916672256c2b2e60d2a2c4256295d53

    SHA256

    d4473b42eee1958eaced28e7dac175fb62c507b95d85c885d9c749dbcd9eaf86

    SHA512

    a16ecd86c597abea0be9d810a779fbc76837f23dd0983c88d2c814506ad46853fcfad006cdf23ab3eacf6f8561f8e656d5a134363ce93a4e30ba710d31f30895

  • /data/data/com.cexwolmbn.uonfuxluh/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    5c8cbc92e498a4ef393158adf8229ada

    SHA1

    9c3f4848af364b1c809396ff1a96cc4e8799185b

    SHA256

    4f5e3967d3d0c8d0d063239fa586dbafe66d58e0ae262228731368dc2a9583eb

    SHA512

    0fb47c0dd7e53439bb377ca947535678ec61698cd0b14f35cccedbf8c861bb674e6c0e09d3465dc4d327693767afd2d13418b8c0a9098ef8a7742e513eb42ea6

  • /data/data/com.cexwolmbn.uonfuxluh/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    4fe6806c63a791ee5771db370be098d3

    SHA1

    8bf0c93e0bed7b3a05de214251345bb6f64abb1a

    SHA256

    1dc3662e14114622e66ff299ce7e8dc47fbd29ad18445d88107f74a1ba676251

    SHA512

    2bba4800b3311dbfed0dd61b6c0ebe4fdd56f8006001f239862901ad9ae5e5558547a44b91b4f4c1885c7967e822fb47a8c3adab79d95540d24222f347d4b724

  • /data/user/0/com.cexwolmbn.uonfuxluh/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    9568b726cd298a79b840f702c4ddc513

    SHA1

    47ba7d6ad1bbd827432c0eebf24bf0622619f9b5

    SHA256

    e3bf6737789ec58d4ec3123e4e268911b9a6db39aab4bec5a99ce8d253738976

    SHA512

    fd0f5c6ddd6141d9f2d72be79540d4c0336e8e2bbf8c3e0b548bdf9f773b1540e35851ca0837034aa1d05336442c1d840756c67447add7cbe75164e2036e6f86