Analysis

  • max time kernel
    177s
  • max time network
    193s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    16-08-2024 22:07

General

  • Target

    0a254ad86c5089eb2d91e1a50f57de6939bcc50721bf49fd2da02dc14f7a374a.apk

  • Size

    4.3MB

  • MD5

    fa62b14b1b52387bd854986d56f98fe3

  • SHA1

    06ceaff9841c105a047906faf7fa4ee2c4ccaf9c

  • SHA256

    0a254ad86c5089eb2d91e1a50f57de6939bcc50721bf49fd2da02dc14f7a374a

  • SHA512

    f990672d1eaade13346bdbee55cc6b47058bfef7d17ed91f6e34c0cb826ced8e794cbb26f95653a2b45ce583ec1eb0d4ba161281e316cbbe42bc7769ded83f7f

  • SSDEEP

    98304:wOQxxQ8Xfhlnqf3EWgcfjireh/ruFZO7Z7fyq:wOoQ8vhBqtPbys/egxyq

Malware Config

Extracted

Family

hook

C2

http://80.64.30.149

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.paciiipdv.wpihnelqa
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4265
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.paciiipdv.wpihnelqa/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.paciiipdv.wpihnelqa/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4293

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.paciiipdv.wpihnelqa/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    0b6d1b495e2d7b6b59d066b754099835

    SHA1

    9a2a5771a76310aecd1a1c795676575c2b0cc990

    SHA256

    9dea7d80363b6be284f8da98212a5eb746873b9411d3e96a08575d6dea8d1cb4

    SHA512

    31b3de1637925c71077d0a4a6a083014da804674ee30fe14153b304e6ce76db9ec91ab4bd07eb57182e26e7ed922b79530211d52dd0fe9c2fffd2416e2d9b42c

  • /data/data/com.paciiipdv.wpihnelqa/cache/classes.dex

    Filesize

    1.0MB

    MD5

    e90f9edf5080e43a3d8b2cc0485a2f26

    SHA1

    68e2ccaa73ead5ebe913dc739ac25958cc2b45f2

    SHA256

    2d0a046ac00ea41e0eb05285fd899c964c660c98c2bf89ed44f0c1fbd34bef31

    SHA512

    e2fc0d2de8deaf15ca069b317d49bc0cea953b193ddb5fbc3588b4b37824cf63878e480f56e90b1e9072ab0978c9fa0f813f3a31fe76a06db024decc000f4e57

  • /data/data/com.paciiipdv.wpihnelqa/cache/classes.zip

    Filesize

    1.0MB

    MD5

    ba6ef5865c96a71315de6d4e3f6f3df7

    SHA1

    db6fe246a575d242eee627aa6d41984b6400a65a

    SHA256

    e95d7f81b56a5196711aaf28701bf17e11786e129d851656d5d9bb1f3769c7c7

    SHA512

    afa50dcf094ef011700dab711624c73e09115cc760645fbc3e48fee46afa9e71cf3f0a3ac31a0cfd7bf83fb09b8bcfdedce828b3bb82f0ac7707ba8bf18a3e68

  • /data/data/com.paciiipdv.wpihnelqa/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.paciiipdv.wpihnelqa/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    fd788b5d9f53efc531d7f32b06d0004e

    SHA1

    66a09f6752e303402665f8c98b0783a7ecc24b55

    SHA256

    310c20ac88ebc814686d9b0e5e8c2807fdfe4f8c6689ea19a604de1d9679f68b

    SHA512

    186313b0c3a11f9860cda343e7349d8f528f5fa76606ce704b81aba57031f1a135dc517b6f64c9a3af32729c49a1fd2b73b6643a960d7da6c6e53b92b4424ac8

  • /data/data/com.paciiipdv.wpihnelqa/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.paciiipdv.wpihnelqa/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    81136770471f1d561bd46beebcd190cc

    SHA1

    a23ee48df7b3541c53f4742b470ebe6e1ee8b30b

    SHA256

    72d1d18ba0a4a52f968db4204958b5a37b87645f79f185f6f2954c007e78bb97

    SHA512

    80c6160fd63decb6bdca1a395691ce349b88ee802b76c643f4226463ae5c6ab6d4bf2010e64157163f9efaf21482caa6bb929436db8dca9d5e8ec3fa2283a6fe

  • /data/data/com.paciiipdv.wpihnelqa/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    afe8d46d8123aacf3bb20534169fcd03

    SHA1

    4c3a14bb1fd0f4f13061b9322b8edcf75d823a78

    SHA256

    68bf61d177077f96155ce88e52b44b85587c7626a4e0bfc3fb19a58a0aa6add6

    SHA512

    439c637a66fb819a0e3fe77c9d2ed2efe978ade5e4e2e4931bf8894c1201d3126991fc2cd5370de7c368e18e0080b611c367d4cfdef2f6d62cac26980a67d3b0

  • /data/data/com.paciiipdv.wpihnelqa/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    8c05b119a05c31bdd930ed5cb9290337

    SHA1

    58b4f7d6e16d2e5f242eb0fc2394b693f3cff698

    SHA256

    7e907d7bca48d243edca631086eef737f5513c787c31820841d8e1e922f7b5a9

    SHA512

    a8bad7de41e104c8098d2062959d2b744d0ee5374227933314aea44028ebfa28a8732883c0ef3aeef9953e4e213b1abb1f4853edd1b1a0b4ad888e22683bdbb7

  • /data/user/0/com.paciiipdv.wpihnelqa/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    fe2145bedce367b54bfab5534563d34f

    SHA1

    04513538243040e57985ca792a6475b39b6951b8

    SHA256

    82fb74f050bac5f05fcc1efd5482d1ac32056ce1b111a6096900dc2eb3fabdf7

    SHA512

    4e51fd455c98babca44e129633db26eea2a7fb965446573e5745ea043b0cb6635a11c54370a295a6d7f1455a290103e258829d9769950ebd16dad19b85bd68ec