Analysis

  • max time kernel
    164s
  • max time network
    193s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    16-08-2024 22:07

General

  • Target

    0a254ad86c5089eb2d91e1a50f57de6939bcc50721bf49fd2da02dc14f7a374a.apk

  • Size

    4.3MB

  • MD5

    fa62b14b1b52387bd854986d56f98fe3

  • SHA1

    06ceaff9841c105a047906faf7fa4ee2c4ccaf9c

  • SHA256

    0a254ad86c5089eb2d91e1a50f57de6939bcc50721bf49fd2da02dc14f7a374a

  • SHA512

    f990672d1eaade13346bdbee55cc6b47058bfef7d17ed91f6e34c0cb826ced8e794cbb26f95653a2b45ce583ec1eb0d4ba161281e316cbbe42bc7769ded83f7f

  • SSDEEP

    98304:wOQxxQ8Xfhlnqf3EWgcfjireh/ruFZO7Z7fyq:wOoQ8vhBqtPbys/egxyq

Malware Config

Extracted

Family

hook

C2

http://80.64.30.149

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Reads information about phone network operator. 1 TTPs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.paciiipdv.wpihnelqa
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4467

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.paciiipdv.wpihnelqa/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    0b6d1b495e2d7b6b59d066b754099835

    SHA1

    9a2a5771a76310aecd1a1c795676575c2b0cc990

    SHA256

    9dea7d80363b6be284f8da98212a5eb746873b9411d3e96a08575d6dea8d1cb4

    SHA512

    31b3de1637925c71077d0a4a6a083014da804674ee30fe14153b304e6ce76db9ec91ab4bd07eb57182e26e7ed922b79530211d52dd0fe9c2fffd2416e2d9b42c

  • /data/data/com.paciiipdv.wpihnelqa/cache/classes.dex

    Filesize

    1.0MB

    MD5

    e90f9edf5080e43a3d8b2cc0485a2f26

    SHA1

    68e2ccaa73ead5ebe913dc739ac25958cc2b45f2

    SHA256

    2d0a046ac00ea41e0eb05285fd899c964c660c98c2bf89ed44f0c1fbd34bef31

    SHA512

    e2fc0d2de8deaf15ca069b317d49bc0cea953b193ddb5fbc3588b4b37824cf63878e480f56e90b1e9072ab0978c9fa0f813f3a31fe76a06db024decc000f4e57

  • /data/data/com.paciiipdv.wpihnelqa/cache/classes.zip

    Filesize

    1.0MB

    MD5

    ba6ef5865c96a71315de6d4e3f6f3df7

    SHA1

    db6fe246a575d242eee627aa6d41984b6400a65a

    SHA256

    e95d7f81b56a5196711aaf28701bf17e11786e129d851656d5d9bb1f3769c7c7

    SHA512

    afa50dcf094ef011700dab711624c73e09115cc760645fbc3e48fee46afa9e71cf3f0a3ac31a0cfd7bf83fb09b8bcfdedce828b3bb82f0ac7707ba8bf18a3e68

  • /data/data/com.paciiipdv.wpihnelqa/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.paciiipdv.wpihnelqa/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    354dc4d57fff3da19abaaf1785edd033

    SHA1

    ae52c5a449ace39b0e54f06833d4331c5c408a7c

    SHA256

    8e0a23541b9bcd1f0ed70ec30265205a6d940a225d2bb89ecc52a363ec50cc12

    SHA512

    0e5d6584e3ef3758a3c256ae4a800454a92f59e8559c5502857a6143e40f340df3d5daeb65a029b492e32b13c394f738fbeb4d5adbf7918affa82dbcf7752071

  • /data/data/com.paciiipdv.wpihnelqa/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.paciiipdv.wpihnelqa/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    11175bc593b03492d5150939a1e0c06b

    SHA1

    d0ffdb4a11d262f155533526ab2e93145bfebd33

    SHA256

    e1e043abdefe28afe254fa1f278ed6c3fdcba494fe4179af0a5c86d159b9925c

    SHA512

    679aeaaf7bb39ba3de2692831bcfca422296b42d305ab86591e150e251655b171feea26bfc5f49263615c8179bca9e3d29799c6def33c860e33ce9cbb82d46d7

  • /data/data/com.paciiipdv.wpihnelqa/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    9c56d06c34eb9727c9f3128c0a9bf079

    SHA1

    6f15fb2710ac988c584cda39dfba7066c01aa4ba

    SHA256

    96129aba685b20c50aa3732510383825148681f6ea51e06b8055850504149366

    SHA512

    7dbb4ed8031e65629314c98d642b9c298b812a08ff179dfedb40a4698cfdb2a80e0adc3b13cda9e33fc300d1b67288b5b09ac3058a1d5a7adfb471cbbcb8eddc

  • /data/data/com.paciiipdv.wpihnelqa/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    5ff4227645271611eb19658f9f7fb645

    SHA1

    2a789c4fd19e10a0ddfb2d18888027f38a7f0914

    SHA256

    7698fd3a2851036baa524475ded4c460bad7ffc026da168320e1623d52f0f8c7

    SHA512

    39bf922edc2998dd77c532ee5cf2abd8c53db5d7a2a06c14802f32a6cea9a895a6857681bf9a32a59a28a747539418bab350b59b8bb450eb8d0065be33f135a1