Analysis

  • max time kernel
    179s
  • max time network
    141s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    12-08-2024 22:04

General

  • Target

    c8cb76348d59ecdd78b1e8826e3e693766a863caf886becb75b667b3f90f53f4.apk

  • Size

    1.1MB

  • MD5

    1d3a5963782db81af4f15af8d3c10d5c

  • SHA1

    abeb5c8021032f9d4fac3a29468bad7e5c17be16

  • SHA256

    c8cb76348d59ecdd78b1e8826e3e693766a863caf886becb75b667b3f90f53f4

  • SHA512

    887449284c8edc7fcf40906f14d7cd2a28f4ab24e1d3a884e78c4772caa368220d71ae0e051a462228d14b2d70c5b4374709705994dcaae1d4cc73a3fa361ab4

  • SSDEEP

    24576:FtnAtFo7v7dVe1myXsU3yxJlVI65nSK7ca/ojyHJg/xW74:7nCo7TdVe178UixJTI65nSAz/XHJg/k4

Malware Config

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests enabling of the accessibility settings. 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

Processes

  • com.volisujalavuze.juruzi
    1⤵
    • Makes use of the framework's Accessibility service
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests enabling of the accessibility settings.
    • Schedules tasks to execute at a specified time
    PID:4595

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.volisujalavuze.juruzi/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/user/0/com.volisujalavuze.juruzi/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    927ebd6cb066c14a042a38f758706478

    SHA1

    e21dc256de25cb14c483af23964bd88495ea5ec7

    SHA256

    8d4969311ec84e777c073b7912204598199f7d76758a4b97833b4de3870d077a

    SHA512

    ddf82f28a0223d807de5795c19ab5abe7eeff8dcdc7cf9a69197bbb4d32492fd15444c3759c5c366f8af309efcb6379b7350b9302316b6207388088f08769418

  • /data/user/0/com.volisujalavuze.juruzi/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/user/0/com.volisujalavuze.juruzi/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    cf04040875e1946a18e04b005d70c6d3

    SHA1

    e4ea5a0675049fe18d8cff8d82d72f7898b2b332

    SHA256

    0688a25673e1a2ea850f59cbcd754bfd216b7f271b8ce7f0e79b6c818fc764d9

    SHA512

    837625a052e9efdfaac4a8a15e1ac7e38fd132a25527981320a646cfecbdf465ac05668332962055d95ac9cec6797cb19856d68e800bdcf895dbae58d90740f1

  • /data/user/0/com.volisujalavuze.juruzi/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    846828b95f799376e49a612811cb3a03

    SHA1

    a0224f335a51306136a84b4f75735270e0a40aa2

    SHA256

    16fef37d34e193d3154bc7a5fd1a0140a55d80312a46b1265bf7d4cbf5cb1dde

    SHA512

    b00ff7c84a2dae81b68723126aff152c355536d878c323755289b76526c359fd25fc4b05305cd8196403e80ec2e6e2d7e9d49325cf78de3a2495c4da17b63b40

  • /data/user/0/com.volisujalavuze.juruzi/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    fa01257095c6b17be1fdd984bda79e1e

    SHA1

    8799d72188d1d29e673dad210ebe044e96f1ffef

    SHA256

    259077ac3e42bdca27f2cad244aa8bb1a0f26b2df569a5cbaef873594ca62103

    SHA512

    6957a61d3fe90f14c2ee2ec2019a74e5f23af4db9fbee9f3f42099b2d7946ed3629b7b3401fe04b81d8cd1d6de3c76cb0c7a9131fd0e9aa0c88760cdd5a4fa33