Analysis

  • max time kernel
    176s
  • max time network
    189s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    20-08-2024 22:02

General

  • Target

    8d470b7a0654582bc81abfa0dfc754af84f124c4a5740881577b7c9a5fdfc632.apk

  • Size

    3.5MB

  • MD5

    afc32b5dd52d8a2e1a78eff6e64d71cd

  • SHA1

    580ada9a31c1cb9733ddfe7faeeedab1c1e22786

  • SHA256

    8d470b7a0654582bc81abfa0dfc754af84f124c4a5740881577b7c9a5fdfc632

  • SHA512

    d1a492e7e3ba9a31f8d30968003bb6fba77ff7d7fb5b582c81c5e95ae56f2931956ace20a1696a68a2a4eec7cedfe90117a11e4f814958efafeb1b623004ecf1

  • SSDEEP

    98304:B2T6h63jiK81LqcyoAdtxv6kVHJEtTJPwSoNB:ou6WKSLqccR8RNoD

Malware Config

Extracted

Family

hook

C2

http://91.92.245.16:8082

AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.dawufisunagula.zoka
    1⤵
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Queries information about the current Wi-Fi connection
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4606

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.dawufisunagula.zoka/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/user/0/com.dawufisunagula.zoka/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    0ef1f75027d1a7839a537cdf9cfa2e76

    SHA1

    66e1e9c30c2d69441cb63c5cf47cb3fea1a616d7

    SHA256

    c11c74b5d8514a37e31950059a29feca2189181805dabe35389b5c8eee750d62

    SHA512

    28d418c22fbfc2e3fbe6a7225f9888722b709dcbeda4a20399b30a87fb21e89122ec274869cb1c527473f615916a21748a4fe00704172b7c5a25c663db6a0182

  • /data/user/0/com.dawufisunagula.zoka/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/user/0/com.dawufisunagula.zoka/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    d9bab4b9c066a34f7877a8bc44957782

    SHA1

    4e83a1479a82dbaf234f170997210879a815d7f1

    SHA256

    f5fc4c4ea4a7da1d4b4f42d9aa8ccc21f0c093482af3760b9dd133d97c6b2a35

    SHA512

    71ff1901285105efc25fb63a9688b4da39abe9ca4e87dd18ad7ae706062da9c89119a1a10234dec346878a3735c288665011d01f3da21d971eff16d63a9369a6

  • /data/user/0/com.dawufisunagula.zoka/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    2c729ed3674216444d78786e3147d61e

    SHA1

    f8c60181636ea618543e625ad9ea4f4511126646

    SHA256

    ef00d3b5b98a11dcc43cb65fdc537ebb597deb49bc103d6dd85711bcd2acdbf3

    SHA512

    1075350ca035a41b091996c99b56b48d34926ea28da7b51b8ce29cd59a8e0f50c4ab731ed57b923f18f2c91106507399711fdddee9a0b42007d8598452ecc468

  • /data/user/0/com.dawufisunagula.zoka/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    6d4b01eb49006d77dfac5c11538ed492

    SHA1

    6ee80f2378bb21872b0caf343255d24537cad37b

    SHA256

    6f2952ad41198c1d6eb49a2a306154442c60dda649a80ea6c7eafbe6ba72cd31

    SHA512

    ebaceb455047141ef2d707731873bfe1ba1e64dc82b7a4d28c6d5736b84f3cd2fac52967066f231d88601c094c2b6b49f9cff01d3d01ee69a7d8ece0815208af