Analysis

  • max time kernel
    179s
  • max time network
    190s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    26-08-2024 22:03

General

  • Target

    386cfdb64392d8e373823a4abcb9c4d95653975a8e68e347bc6bacd648965299.apk

  • Size

    3.4MB

  • MD5

    dea353c6524291d2d20ef469fb7111b9

  • SHA1

    1be6f7923b820f3d4c61fa799f5068380a2a02d1

  • SHA256

    386cfdb64392d8e373823a4abcb9c4d95653975a8e68e347bc6bacd648965299

  • SHA512

    2788653ea4d31de41b9fe6450927d15f856c893729bdd01e094d5b6abdf5290439194033b52cd16ea687e276d5a259dfecadefcf50951567d4d83fbce089cc45

  • SSDEEP

    98304:j0NX8QjRozKDAYBVV05RJ6PBoXCS0TKRNKFm/4zY0tYW:j0FoEAYF+yXC4MyGW

Malware Config

Extracted

Family

hook

C2

https://ws.holenomolena.online

AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Reads the contacts stored on the device. 1 TTPs 1 IoCs
  • Reads the content of the SMS messages. 1 TTPs 1 IoCs
  • Reads the content of the call log. 1 TTPs 1 IoCs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.tencent.mm
    1⤵
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Reads the contacts stored on the device.
    • Reads the content of the SMS messages.
    • Reads the content of the call log.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4473

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.tencent.mm/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/user/0/com.tencent.mm/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    c2fc5f3890607df285b893fd1110646c

    SHA1

    f46a5c8ed140251e0b3b355d0f932d5ea328f04c

    SHA256

    eb21824699418d6cf8fc8bf2be9e3527d1be0ab005d80a39d140973a066a8492

    SHA512

    64d39133a05374e6c3d7cec9066e875ffc336f923c174473d19930a8fa343005ddc840f0d37face0c79f2963973c7841b6f881440543329f8dfefdcc8c843374

  • /data/user/0/com.tencent.mm/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/user/0/com.tencent.mm/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    4723aef74f5b72255fc8ce4e65eb064f

    SHA1

    3d497abca663641469c7c13a8381c7cc724d2030

    SHA256

    d1074c04c0a5923fe4bf9668fdb4c9b36b3d84ebaf485008b4e541abb866038e

    SHA512

    186298839ad6879b9e233063d4f4d9ffdd9e0674b4d337f99249ab3febb5802506cb50efa92a2c6b1d782fd77795e53415f940a3276c8d08f510358af8a65b68

  • /data/user/0/com.tencent.mm/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    b161e2e2813430b177dea81022a2d376

    SHA1

    a7864c503359fabae3a629b375c4f160921b248e

    SHA256

    199c9fd5722bf42e542b2bbcc8e4b0325b3b0b342e7dd937fef59919e3eede82

    SHA512

    f73d1e72451b1b9cf13e2490cac7e55c9c157f7826d7c3db00c744084e43f40498630c29e2ff28838410d9597f2411b59004712e4f7cc5b332fa10bdbc701614

  • /data/user/0/com.tencent.mm/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    74e9b4ac43f832a7bfd4ad75b20c40c9

    SHA1

    2cf8eae33ef492a62c1cc2e13c8cb6f14ad0d563

    SHA256

    e5176bdb372615358806b01a55c8981e69b8f0f107a12001e684099354f2cef3

    SHA512

    0c9f98d667ac40e704c43aab2ea3a289a229f396d4bb39144e6863ab6af7967ef75468a4d80ddb79838b296da4afde1325d2cd6604ccb0a936860692d4dc4f2b