Analysis
-
max time kernel
179s -
max time network
190s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
26-08-2024 22:03
Behavioral task
behavioral1
Sample
386cfdb64392d8e373823a4abcb9c4d95653975a8e68e347bc6bacd648965299.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
386cfdb64392d8e373823a4abcb9c4d95653975a8e68e347bc6bacd648965299.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
386cfdb64392d8e373823a4abcb9c4d95653975a8e68e347bc6bacd648965299.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
386cfdb64392d8e373823a4abcb9c4d95653975a8e68e347bc6bacd648965299.apk
-
Size
3.4MB
-
MD5
dea353c6524291d2d20ef469fb7111b9
-
SHA1
1be6f7923b820f3d4c61fa799f5068380a2a02d1
-
SHA256
386cfdb64392d8e373823a4abcb9c4d95653975a8e68e347bc6bacd648965299
-
SHA512
2788653ea4d31de41b9fe6450927d15f856c893729bdd01e094d5b6abdf5290439194033b52cd16ea687e276d5a259dfecadefcf50951567d4d83fbce089cc45
-
SSDEEP
98304:j0NX8QjRozKDAYBVV05RJ6PBoXCS0TKRNKFm/4zY0tYW:j0FoEAYF+yXC4MyGW
Malware Config
Extracted
hook
https://ws.holenomolena.online
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.tencent.mmdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tencent.mm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.tencent.mm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.tencent.mm -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.tencent.mmdescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.tencent.mm -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.tencent.mmdescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.tencent.mm -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Reads the contacts stored on the device. 1 TTPs 1 IoCs
Processes:
com.tencent.mmdescription ioc process URI accessed for read content://com.android.contacts/contacts com.tencent.mm -
Reads the content of the SMS messages. 1 TTPs 1 IoCs
Processes:
com.tencent.mmdescription ioc process URI accessed for read content://sms/ com.tencent.mm -
Reads the content of the call log. 1 TTPs 1 IoCs
Processes:
com.tencent.mmdescription ioc process URI accessed for read content://call_log/calls com.tencent.mm -
Acquires the wake lock 1 IoCs
Processes:
com.tencent.mmdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.tencent.mm -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.tencent.mmdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.tencent.mm -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.tencent.mmdescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.tencent.mm -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.tencent.mmdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.tencent.mm -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.tencent.mmdescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.tencent.mm -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.tencent.mmdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.tencent.mm -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.tencent.mmdescription ioc process File opened for read /proc/cpuinfo com.tencent.mm -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.tencent.mmdescription ioc process File opened for read /proc/meminfo com.tencent.mm
Processes
-
com.tencent.mm1⤵
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Reads the contacts stored on the device.
- Reads the content of the SMS messages.
- Reads the content of the call log.
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4473
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD5c2fc5f3890607df285b893fd1110646c
SHA1f46a5c8ed140251e0b3b355d0f932d5ea328f04c
SHA256eb21824699418d6cf8fc8bf2be9e3527d1be0ab005d80a39d140973a066a8492
SHA51264d39133a05374e6c3d7cec9066e875ffc336f923c174473d19930a8fa343005ddc840f0d37face0c79f2963973c7841b6f881440543329f8dfefdcc8c843374
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD54723aef74f5b72255fc8ce4e65eb064f
SHA13d497abca663641469c7c13a8381c7cc724d2030
SHA256d1074c04c0a5923fe4bf9668fdb4c9b36b3d84ebaf485008b4e541abb866038e
SHA512186298839ad6879b9e233063d4f4d9ffdd9e0674b4d337f99249ab3febb5802506cb50efa92a2c6b1d782fd77795e53415f940a3276c8d08f510358af8a65b68
-
Filesize
108KB
MD5b161e2e2813430b177dea81022a2d376
SHA1a7864c503359fabae3a629b375c4f160921b248e
SHA256199c9fd5722bf42e542b2bbcc8e4b0325b3b0b342e7dd937fef59919e3eede82
SHA512f73d1e72451b1b9cf13e2490cac7e55c9c157f7826d7c3db00c744084e43f40498630c29e2ff28838410d9597f2411b59004712e4f7cc5b332fa10bdbc701614
-
Filesize
173KB
MD574e9b4ac43f832a7bfd4ad75b20c40c9
SHA12cf8eae33ef492a62c1cc2e13c8cb6f14ad0d563
SHA256e5176bdb372615358806b01a55c8981e69b8f0f107a12001e684099354f2cef3
SHA5120c9f98d667ac40e704c43aab2ea3a289a229f396d4bb39144e6863ab6af7967ef75468a4d80ddb79838b296da4afde1325d2cd6604ccb0a936860692d4dc4f2b