Analysis

  • max time kernel
    179s
  • max time network
    189s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    13-08-2024 22:00

General

  • Target

    80806ed0aed4d87ecfe810694f4e4b5d787f0bc1678df511cc4fd32535904cfb.apk

  • Size

    4.2MB

  • MD5

    20aabf38bed42a2b1651464345a83720

  • SHA1

    a3144a3e951894223279c974f0c15e789a7dcf95

  • SHA256

    80806ed0aed4d87ecfe810694f4e4b5d787f0bc1678df511cc4fd32535904cfb

  • SHA512

    24a464c7215ac48158cb964e96298769ea3b41e11ab658737ba22793f652a09f00135603d2b89d4439304c9f407c1f7fe49b1893a82a4ea8d91830a4260b17dd

  • SSDEEP

    98304:LPhmtWA5B017CHquT/9YE/99NXONeVMM0XIzbfKU+Nksgv9qEWGFY:Lst1n017QquT/PfQMF04zj+KjvIwO

Malware Config

Extracted

Family

hook

C2

http://134.255.180.156

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.tqcejncgn.ieaxtscac
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4244
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tqcejncgn.ieaxtscac/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.tqcejncgn.ieaxtscac/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4270

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.tqcejncgn.ieaxtscac/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    15a3d4b979b33ef06c16c0715b9f4179

    SHA1

    1b455c36a2bbdecc3bf061b472593739d5d417f2

    SHA256

    b752a977c620d378709dff91f80eed5b5f273579eeefc657976847c54bb770e9

    SHA512

    acd10a95fc9738eb4cc5d17332208f59d5ac857d51fcd47cbcaeff125857a10d169463525a1f828484a041813dfd223ab98475d318be799bc8cf1083bdbf392c

  • /data/data/com.tqcejncgn.ieaxtscac/cache/classes.dex

    Filesize

    1.0MB

    MD5

    90e51bc66fc49c8d5037342432372418

    SHA1

    0322fe938d64202818d9094ea0d8e943337d8e13

    SHA256

    e834cdf5431646b0994817ad2b133ab9fe088c70a7f3a5ae5006a8699fa58674

    SHA512

    a175decf59b7e1337efd06c00d620399dad86480a6d88beb1a560c3d0b31fbdb2aa6bbb651b6fcdaceff3da1b4a2bfe058c92c9d36ca82b20f891639f8430c84

  • /data/data/com.tqcejncgn.ieaxtscac/cache/classes.zip

    Filesize

    1.0MB

    MD5

    b4109365491cbf647597ba9ea80f7aba

    SHA1

    561c66f0818a879dca2a1c558cff7bfa6c559cb9

    SHA256

    a30f37779c465fcd0f5d2dc599f64ac236b47f2f98671fc7b9191ddd220e0936

    SHA512

    dcd3c5064d91e47cac41a015505ff38fd43882c2281b21ce4cc4733ceea2481d39d39ee9cf91469a5ad7e3cbce9066307c4250a1a33b1b5f7fe5dc0972866bd5

  • /data/data/com.tqcejncgn.ieaxtscac/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.tqcejncgn.ieaxtscac/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    c98b5304a5571e568b80fb98641fdcc3

    SHA1

    602886ee88a37e751e602d1b8ccf520e08cf6259

    SHA256

    e6f9eafcb33a17ca2a5a1dae494b623a4a74d72fb7a05168152a783401bcfdb0

    SHA512

    87e54fa25826b7f0fa0934b33659f1567dbce24368f34eb367fa415a1b5881ee3e179299c822a305e0732e3ab0e86d8edae21ffd61ca93ce0d6d8d73ef575742

  • /data/data/com.tqcejncgn.ieaxtscac/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.tqcejncgn.ieaxtscac/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    3ec5d12cfa683d0fff6be32b1b5d1aec

    SHA1

    73caa4b2cda8b535b2a288e8ae1374bb55affc50

    SHA256

    672d710bd275bbfe248c75a86db83c5cab1cf6b7f70d20fb69ce8df6a7d8a984

    SHA512

    265e193a1096b24666ae6770d66e475adf012a2c6a833532908cf175a6f0d301d201d45b4ff30fdb3ec7700b8c5768ae5e0da3bff5dcbee1ee5d3bc46cf86b6c

  • /data/data/com.tqcejncgn.ieaxtscac/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    36161a7073eb248cb5ff826000b6d5e5

    SHA1

    3e89f8f4acfac9a2c85f8144763e0d63f8b8b73b

    SHA256

    978641436fc01afd6ca47ce7b3d6a29b7757d1377e14e7eeb883f574df7e6dc3

    SHA512

    6bf959d1841f9ee206001d128f0a7f65965a780cea8f00db608883b998931c04da1bee8e99ed80a603d52b81c1aa0dc079d8c5bbcfa2f1dc7888e9ac898db927

  • /data/data/com.tqcejncgn.ieaxtscac/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    9615440d47832507030ee387f50b3a32

    SHA1

    8aac871cc3b8f05666f7a8ab8a1b99c07a87cdae

    SHA256

    95a086aaec22bda2601db8763a01bd622ff358b806d25a9700ef45281f2cae59

    SHA512

    970c1759a6e1a81207a4992d61179eff1bdb412cbc073f3efa8f79adbd55967216d46a2f71ae559e9e650018a8315ee54b9271b84d585538674ae766ec3fd673

  • /data/user/0/com.tqcejncgn.ieaxtscac/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    3e36a6b40c32b10cb4ba24273f6d1bfd

    SHA1

    baef3961332cdcfb2e7f07eec474b3a26f6e1740

    SHA256

    67d0bae000f680ea766044793ad6ef778a871d870b3da4c3b43e7218dd3c6430

    SHA512

    3f9657abedc6330d5f04b8fd7e0d63aece8d8dcacd8b942a4fbffe4c5c8baedda23c3c89ef27059e99e2153a40e43d161d42a2176e66427d28c4ec5cb2d6dc55