Analysis

  • max time kernel
    179s
  • max time network
    189s
  • platform
    android_x64
  • resource
    android-x64-20240624-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system
  • submitted
    12-08-2024 22:00

General

  • Target

    826721e53ac786981c5766a9f833b7442e299bdb8dd1d76c8e7306397afd2823.apk

  • Size

    4.3MB

  • MD5

    86e7010b107e25d07da9bbe84e8b55f9

  • SHA1

    eddf5d6aa948db8a2672c60a5c8e6a487c356312

  • SHA256

    826721e53ac786981c5766a9f833b7442e299bdb8dd1d76c8e7306397afd2823

  • SHA512

    b8324fa18c48b1f9883446bc316cb002b58e6d808e9754c61931c9beb46908cdc8f63c0876285cae4f3b03463c209aa1380c481f5fd5fc2506c284491cd4d036

  • SSDEEP

    98304:bVQCQ69BgZIXOOYHDF4SwGW1EQ3pCXi0spAOMlgbKTcBl3Di+L5:bN3XOFI11V3pCy35Ml1SDi+l

Malware Config

Extracted

Family

hook

C2

http://193.3.19.40

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.cexwolmbn.uonfuxluh
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:5002

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.cexwolmbn.uonfuxluh/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    82a2520fb9c4f29f52cef1686906f4cf

    SHA1

    7462134200ac38643c30c01e4b9755060f3b2e65

    SHA256

    cc607f7828822de776d2f6664245f98f648acd26d8ad563a4df20ba4bcdd76ad

    SHA512

    7cc769058c66ae209ed3de709b1880235f7aa0ae2121a41fcf16d62de07958f27a749ca310a8ba6d03b4c9d23f9168540a5fe662f87b1e3833b78eaea8695ce1

  • /data/data/com.cexwolmbn.uonfuxluh/cache/classes.dex

    Filesize

    1.0MB

    MD5

    ae1b65c9bc777ce41f23f44ce56cf6f3

    SHA1

    cd1bd83510c2daf9362262440a30c53fa04fc301

    SHA256

    759eb20d277a42bfcde4858c882a303081bfcc98f1e161c15a2b00f700223f5c

    SHA512

    19118ceb9b452cff745c1b0397f76597c9ee71df874b09d0146e9e17422ce5ef52e828f6626f17e20aaa40660b34003362fa2b3f52fbbdeef41f2af3196a9933

  • /data/data/com.cexwolmbn.uonfuxluh/cache/classes.zip

    Filesize

    1.0MB

    MD5

    bb3a17855f206e1ae222a5e5391df12d

    SHA1

    21bb7b4ab7f20ee22c85fd1096040ef55db3e847

    SHA256

    a14fd46f618712456c576346d14a16207b2102f8678cc2a1c521ec902e90722e

    SHA512

    deadb406ffa5c4137761e0e3322d4002bd4817efc7dbf2193d706c609dcb26074f072efaa0cd0fd2a148b7f3d9ea833f94e71d2ef2974cfd40f48f26b5a2033b

  • /data/data/com.cexwolmbn.uonfuxluh/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.cexwolmbn.uonfuxluh/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    40b358ba968672cbffdf81e4b397f91a

    SHA1

    dbffde8121de72cea04af7bdcb24ad03eb935094

    SHA256

    5ebbba202b6914d0f1a27edd7fd716227c51d9f1f6585d7beddcaa96d17a7762

    SHA512

    d4511c83be6eff8a07a25924ae03803d70774aee50c174192c7d744d68c7bbac21414d91736c2f6532064c389ed2b20684f444e25c688c89582eeeee82b728bf

  • /data/data/com.cexwolmbn.uonfuxluh/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.cexwolmbn.uonfuxluh/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    01cc34e7d016714e89d10bd6b59f08c2

    SHA1

    ae74a6281c0dfd2fb67769344cc858768df8ce2a

    SHA256

    2c9576dbb76844b93b3cd1dfa81c377d1934bcff9f4e91a32ecac39632b63abd

    SHA512

    23dfd55dccf48227b1be18c0ba23dcaa95f0ac24992e2aaf5b3c0f6e92ebdacd77748be69a6f392888dbfc85eabb0550397f3f69e3257a856d715c774eddb686

  • /data/data/com.cexwolmbn.uonfuxluh/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    28bbd88b5e285acbdb9e60de2526a269

    SHA1

    8dfbacb4ac18dd81e33b784ee26a17c050117f5a

    SHA256

    42dea97a50dd86c1722a57849b71a07c536a0ae2283129fb0ecd390ff505c508

    SHA512

    b6dfde7d19a988942cb2c23a4911627fd524ecf95a615f1c52f079ce24c6f011bdc2bd0acd44de5ebc9398a09a6c7f03ce7bec86acfa67f94997dc2cce14e6d5

  • /data/data/com.cexwolmbn.uonfuxluh/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    3f3ba444f77e8aee34e0e35a298f3636

    SHA1

    508a6b76f826fb7cd14854cbe4d98cd7e305e502

    SHA256

    362b572ed8a6215e9ffb31ee4a4c14a7f8ca0cc737d2194ca0dbfdf08df1472e

    SHA512

    40d47d3983eef99734709d7a537be2f9b1daa0e09c92c7c984d0d41b37603debcd9eb044324fef5f59a997e7952886669cb4ec97876b64110034a2de642008e0