Analysis

  • max time kernel
    179s
  • max time network
    192s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    17-08-2024 22:03

General

  • Target

    ac26ba1f2577656b7be6c1038c9a54ecc88561e2bd537fa7aa4d07917bc50fff.apk

  • Size

    4.3MB

  • MD5

    d59ed1dc7bd6cd41cb2c07f4e299684e

  • SHA1

    7fc7e14827b7e8ce35219cc18aff688d91bd932c

  • SHA256

    ac26ba1f2577656b7be6c1038c9a54ecc88561e2bd537fa7aa4d07917bc50fff

  • SHA512

    012cdd41d76ee59906aa6c716372d97b19cc47fe304faf7bad4d4bb331873c96de2175db2182825a873daa087786852cb7d3bf371e7193e4f3b612479296bcbd

  • SSDEEP

    98304:dQ6yhT0EmcZR3S1+ItKo0kIVCE6HNQk73bC08axsqRrOSlKWHLOjZ2:dQXCntgPqNQU/xHtVlKcGZ2

Malware Config

Extracted

Family

hook

C2

http://80.64.30.149

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.jficfuhuw.wsomqvmjt
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4264
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.jficfuhuw.wsomqvmjt/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.jficfuhuw.wsomqvmjt/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4294

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.jficfuhuw.wsomqvmjt/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    54ee83e587d1c4055f23ca29a01379af

    SHA1

    ff837c5765e7b65594a6979acecba5176e1179cd

    SHA256

    6ea3fc5d4642170507868e48965b1816ddc67745c48b9270c5e0569199a8b504

    SHA512

    a35376c8facd285616e2283e76e3dd6c8762cb9623d77e14ccc4a56d68447563baa5e4e68694c64382422f3d358c235a45b99956b89c6afb382c7e396624b65d

  • /data/data/com.jficfuhuw.wsomqvmjt/cache/classes.dex

    Filesize

    1.0MB

    MD5

    20cacd7bd0d95aab58ff66315b5ce08e

    SHA1

    fea516c53224e7e00ed660b4b776393804659200

    SHA256

    46d5f61b5f23c6145a70babdd35d5522da181f7eb20eff7b0f8da583bdd5076b

    SHA512

    e9471384df6315f2cd2e93e3058eb92ebc8455e40f3be652f550eadc630d3d1075f95595f2144429f7b7dbaa5f1162c2370eec3a7414b74e15aa1f4d2770dc3a

  • /data/data/com.jficfuhuw.wsomqvmjt/cache/classes.zip

    Filesize

    1.0MB

    MD5

    5933c07ea71029e8433aef3a83d3a2f9

    SHA1

    668d285682f61c2f44e3ca6d2bdb7194bf3ed80c

    SHA256

    8859742b598599917f58b84ae8faacb1ca183666da3f8c97e3859b38fbe05c48

    SHA512

    4a7a7e93f9d2684380493dfbec175e034d32249c1e010ba373a34cd90e7a7a42c3865f8ca0b9a53ac43151ed80c5c74871e03b942ef421892142687b0ce674eb

  • /data/data/com.jficfuhuw.wsomqvmjt/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.jficfuhuw.wsomqvmjt/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    166d4f128a5402042a9960aaf3b524b4

    SHA1

    06e30d9347c864e752fbdb0e0753966424d3a7bf

    SHA256

    6b7da94faa0e1069590dccce362f122ff574b38b060ddca46369649892eed5d2

    SHA512

    1472c383e17fb4a9f1124bd9a1dba45920f962e5502ada9a51d7f300dd28bb9b29668435d0b224f4205447aa23ce808284dfd24813d6a2dab8d6f1fe08171e09

  • /data/data/com.jficfuhuw.wsomqvmjt/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.jficfuhuw.wsomqvmjt/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    5904662917e8dc25d668734abf8624ad

    SHA1

    3c20f75aa659aa15c0c4914243deb56a173b7f5e

    SHA256

    c97ea5db2f799f9109f50b7614eee9cf8eef122b2fc8883bd817ca6482b4bed4

    SHA512

    c545c5103102a7e1b21e383dda15fbe8e1c994960f10ab969465cfe6037fe095a76d29ee86868b2762ed84de61eadaa89ceaea995d511242088e4ee19c1643d6

  • /data/data/com.jficfuhuw.wsomqvmjt/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    3a925e968574c20ac06ff0a52d16dae6

    SHA1

    d0cda5a9319cc026b122db0156bc80ce6aaa8469

    SHA256

    9746531eaea7755766bebccf56c25fddd66379c80fdf0a806caed5f53ad4dfd0

    SHA512

    d3acce7b08e6e533d17de644b2b47328b639d28b91af3f11ef03cbaa8c032f49aa2573c18f8cd9a4f395410baf0074d50a72984c2d7414d8c6012528011b7d87

  • /data/data/com.jficfuhuw.wsomqvmjt/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    deb64b224e8b47424e3f1bf3a07a6197

    SHA1

    297f360b17af8ceda255c814c5dbc5601a7cf0b6

    SHA256

    e1db8661190fc27f3ae21f66fb5c16094f07498d4f4e503cd312543b8e85c3ad

    SHA512

    fa8f08357c4fe4b6e0fb6046eb85257e7340c3d7f7d1172ed4a5bd8e9e84c5c23e6c8c5e15f56dd2e8b563a7b2d7b4cacb8d5e7f0e61c242d7f9c467b0e95006

  • /data/user/0/com.jficfuhuw.wsomqvmjt/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    60282f34d6263f9b74eb1a0edf321b59

    SHA1

    a6aeba731290856744b071ce53e9c23d9f0c1fe9

    SHA256

    ff8cc17571a79c1919644761283bd56145c24e616c0c67d82ffcf3d7e3e37b81

    SHA512

    3e453e1c037e021710c47c1fac31638fe281f9d83ca85227354885a2371693048d78cfd4a4542cced59cb585854ca9a16bc3916aba1b029153ca5887d73058aa