Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    android-10_x64
  • resource
    android-x64-20240910-en
  • resource tags

    arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system
  • submitted
    08-09-2024 22:01

General

  • Target

    1ea9e123831e0d35b6f66f7bd654361436aff3e337bab144b13333c660b38a92.apk

  • Size

    4.9MB

  • MD5

    c4d34b47e9204f25512e78ed5c5dce4b

  • SHA1

    a84a56be0168ded947018bcbb9e069d9c11ddce2

  • SHA256

    1ea9e123831e0d35b6f66f7bd654361436aff3e337bab144b13333c660b38a92

  • SHA512

    161ebd23f3e30308cbb44c1e0db4057c5447fa103551cef1810f4504b5a4bd3d1a489704f1c8e6170d956afdf0ff48cee2eb98d3ba7b69c6f4e3c33dfe371c07

  • SSDEEP

    98304:moxOqsFMFLW0SOA2lbADLDxUREtpc56u9x3G+L9v4+WkXft19:v8rFCLhSOvlUDZpcVxbL9g+5R

Malware Config

Extracted

Family

hook

C2

http://134.255.180.156:3434

AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.viber.voip
    1⤵
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:5097

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.viber.voip/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.viber.voip/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    f2499a53443a9cafcfcaacca1575dc22

    SHA1

    f0ba2bf45f7e114ef1770cedf6c0d3ad601c180c

    SHA256

    fd805fa56c69788a47e54c000086714c39b3bb740c1a369e69c626c1ba8b0ade

    SHA512

    d9ac2f9eb0ea4df2fccaa229bf7610a315776469f0f5ec021f9b292e760b1862bd086be3ac1860f384f669c83a30454301cf3432baa18a8da7b099bc3cfff9db

  • /data/data/com.viber.voip/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.viber.voip/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    16a0aecd2406b3799b724d74311507dc

    SHA1

    9bc4438ec8d4b41a432d9b692794045f741b3d61

    SHA256

    f3cce6c1f150a3bd491d6b2bb4ce9825db733ed228216dd98e370ca4d6cf86b7

    SHA512

    2cb7df1a510da7a4865b35e4c59fe24287ac7324e5a875016091a2052ea9b53fe3cd20e24a3592423b011efd350abe10e70e03ce5fc41c23ea41752569c93f9d

  • /data/data/com.viber.voip/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    3ad91a0587b55733284ae0c81b1aea9e

    SHA1

    5801535e0c576d5443a50fb356823bd964a2e251

    SHA256

    24c9c1b99cf0afec3029309d69287dbefbb639279a816943fa6bf257bf35a43c

    SHA512

    e971b0b2e3252ba6e86514801b759f114e39b1c5f479334c8d0dc4a234de10b22de630c45f08d0a23e98b278083a9ffb4654ee41abca46250073ffff3ae88622

  • /data/data/com.viber.voip/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    a90be1fc808d3937251dccae8404f252

    SHA1

    9394f00ce50193610c4d998b8da3cd984ecef507

    SHA256

    9fc8290ae33e0cd53afb6b60e385d1f6c2a9292d63ba4e46f4ab3c0194049be1

    SHA512

    b72056c19be5ab7a2dda959aa66865f8a12e5dd08bb974c80db393572b4a4f41be657f27461bfdf3f3d2e684339a3dd8e73e417abd403c96915ab624cbb67c0c