Analysis

  • max time kernel
    44s
  • max time network
    187s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    12-08-2024 22:22

General

  • Target

    bce14fcf7b5c141f3d9f5f31b1aa60db0d951a3728b1ed3d9eae995e2574e87e.apk

  • Size

    1.2MB

  • MD5

    dc5b59b765c50454c3668bc2608ffe52

  • SHA1

    5945bcc40840cfad63b1b347c8ed87c81ead4e74

  • SHA256

    bce14fcf7b5c141f3d9f5f31b1aa60db0d951a3728b1ed3d9eae995e2574e87e

  • SHA512

    ea2e30b743972f5fb167e8b5d75d28d305871f532362129b5ba58c5f949173821502a186637844aa908c9ada428791d2cdee968a64956c9ff4e9ed4c74665792

  • SSDEEP

    24576:gEs5wSn188ECTBwY16MPIrunOK3KmEFyErgDR4fHklENPl:HK9iCdwY4cp3lEkErgV6CGPl

Malware Config

Extracted

Family

hook

C2

http://wispy-pine-99659.pktriot.net:22284

AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.hevumejiyafelo.poyadane
    1⤵
    • Makes use of the framework's Accessibility service
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4253

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.hevumejiyafelo.poyadane/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.hevumejiyafelo.poyadane/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    975272999480a27b9985ec65d653fedb

    SHA1

    a52ca53a99283aac65d08d085d50f561b33ba6ca

    SHA256

    01585c2411e14ecc14787a9a84956c3dbde6dbecd17e5fcb7b1c6dd8e533bf18

    SHA512

    7dc2a407a34050ccc47c3cd838796a2c03797856dae044edcc4e6b1d16f33e035c30526b2362dd98908c6054b63a7296a9b1b5efd50b74afef2eef1869fc3d68

  • /data/data/com.hevumejiyafelo.poyadane/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.hevumejiyafelo.poyadane/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    c9b4cdcb81d8ce6b33a4e15e196dd97f

    SHA1

    05e61a740ee2934290fa87a1209ac045ef1d882f

    SHA256

    80b73d30dc2a6d4ddbe92f7ad8f55006f541f71e6210a10c6a727bd0943f6628

    SHA512

    051d661430fb35797a9699e48f67782c6f084ae6b1cb9168b2f6dc01796a03c05635ec26c080b3d169dd7ae2f631e09399fd2555e51370209e0933d639b82abf

  • /data/data/com.hevumejiyafelo.poyadane/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    afcdd437c96c065e1059217b91a3020e

    SHA1

    a64fd5c40185b3e503be03b3e54e80d1651a8872

    SHA256

    ec5081579f3dc80042f486060513bf6e28d3f40ff2a0290f9dd13388fd4bb65d

    SHA512

    5fd31d4f77faa3abe5dde847ffa59f86d7ab71528ee7791f9483e396a1c1e6b96c4dce49cf1e5b97ed2e45e33f2aaf0ab62a39688ec721d64f2fe4c52c043152

  • /data/data/com.hevumejiyafelo.poyadane/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    70db998f232ce18ac035b4b660cc6d12

    SHA1

    f494dc870dec0ae79747dcdb893e810c2308f3fd

    SHA256

    c353707f5bc835031422d40bb5c251e3b799676d9ad02b7dd6868ef7be890bb8

    SHA512

    ecf8c1c5884fe2cb3f099c479566875d58e39b86b84df3df5dfde7c4fbff65a4546460a16c1631a71c3d1155059039de83a0a0f5803decd044815e3418e85fd5