Analysis

  • max time kernel
    179s
  • max time network
    189s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    12-08-2024 22:00

General

  • Target

    826721e53ac786981c5766a9f833b7442e299bdb8dd1d76c8e7306397afd2823.apk

  • Size

    4.3MB

  • MD5

    86e7010b107e25d07da9bbe84e8b55f9

  • SHA1

    eddf5d6aa948db8a2672c60a5c8e6a487c356312

  • SHA256

    826721e53ac786981c5766a9f833b7442e299bdb8dd1d76c8e7306397afd2823

  • SHA512

    b8324fa18c48b1f9883446bc316cb002b58e6d808e9754c61931c9beb46908cdc8f63c0876285cae4f3b03463c209aa1380c481f5fd5fc2506c284491cd4d036

  • SSDEEP

    98304:bVQCQ69BgZIXOOYHDF4SwGW1EQ3pCXi0spAOMlgbKTcBl3Di+L5:bN3XOFI11V3pCy35Ml1SDi+l

Malware Config

Extracted

Family

hook

C2

http://193.3.19.40

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 21 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.cexwolmbn.uonfuxluh
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4638

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.cexwolmbn.uonfuxluh/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    82a2520fb9c4f29f52cef1686906f4cf

    SHA1

    7462134200ac38643c30c01e4b9755060f3b2e65

    SHA256

    cc607f7828822de776d2f6664245f98f648acd26d8ad563a4df20ba4bcdd76ad

    SHA512

    7cc769058c66ae209ed3de709b1880235f7aa0ae2121a41fcf16d62de07958f27a749ca310a8ba6d03b4c9d23f9168540a5fe662f87b1e3833b78eaea8695ce1

  • /data/data/com.cexwolmbn.uonfuxluh/cache/classes.dex

    Filesize

    1.0MB

    MD5

    ae1b65c9bc777ce41f23f44ce56cf6f3

    SHA1

    cd1bd83510c2daf9362262440a30c53fa04fc301

    SHA256

    759eb20d277a42bfcde4858c882a303081bfcc98f1e161c15a2b00f700223f5c

    SHA512

    19118ceb9b452cff745c1b0397f76597c9ee71df874b09d0146e9e17422ce5ef52e828f6626f17e20aaa40660b34003362fa2b3f52fbbdeef41f2af3196a9933

  • /data/data/com.cexwolmbn.uonfuxluh/cache/classes.zip

    Filesize

    1.0MB

    MD5

    bb3a17855f206e1ae222a5e5391df12d

    SHA1

    21bb7b4ab7f20ee22c85fd1096040ef55db3e847

    SHA256

    a14fd46f618712456c576346d14a16207b2102f8678cc2a1c521ec902e90722e

    SHA512

    deadb406ffa5c4137761e0e3322d4002bd4817efc7dbf2193d706c609dcb26074f072efaa0cd0fd2a148b7f3d9ea833f94e71d2ef2974cfd40f48f26b5a2033b

  • /data/data/com.cexwolmbn.uonfuxluh/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.cexwolmbn.uonfuxluh/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    23e081223900e236122a1b2a1876f704

    SHA1

    660cdd90c7f4c691a88075cd981a9f022ad84f7e

    SHA256

    8342f8dc6c38f7129d616f426281b225a8843acbaf2cb5003d2e0802817c3d66

    SHA512

    29769fd7aac4ad96201e4a57f17b65a4d486c9ce83a711e1558ca6993fd8ba4688c8e4aab875404535de81219791c1f6ef840caa279e9eda5472b2219335f191

  • /data/data/com.cexwolmbn.uonfuxluh/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.cexwolmbn.uonfuxluh/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    6fcbbe2da6b1780dfba8967344dfc7aa

    SHA1

    765e32bfbf3f42d5f3f7d6ad1808228adffafeb4

    SHA256

    3c31237ca3c81a6b9a5c9ec2b19c920c3b6f26a4b36099d8c72b2533766d938b

    SHA512

    2a87114dab6cc7b348a77cc3a6293e8c5dc59aaa4f2a917dcfd8e60ed9a8ac547808bcf3eef7a4f9e2355f0f21a34d4489b0aebdf6aa6b8c4f358d1d64862a20

  • /data/data/com.cexwolmbn.uonfuxluh/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    eccb530bef7519f5e4684c01bb29a529

    SHA1

    5c9553e398a90500e0b8dc0404fec4277a585d60

    SHA256

    42649fbb2bb5865702851c825828fabd677fcfe44c720c52c38b1c97bcd5fe7b

    SHA512

    c14fdcd3244ce05aca489e1fc467877201c1a625e2431ccf7ff0e1c65e86b3fd10c68660d204782dfe49ca92c0cbb565348caa667d10edc1eb0e8191a3d9c758

  • /data/data/com.cexwolmbn.uonfuxluh/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    bbdaa5597d2bc5c4b7e974e1511008f0

    SHA1

    28ddf1ee450b279d419aa9421b468d89953f558e

    SHA256

    fb32b0387c7216951fa5386672828d71af5cf72637edeffe7dcd628f8f8d07a1

    SHA512

    e1adc569949e7a99e3e028311f014ebf8008c994f8ef5d098b61c780d460379fe423d63cd74851d6d202c0810a1a2287334f692725f49d7205e0203b4dd620d9