Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    08-09-2024 22:25

General

  • Target

    15fe82bd921dafbf6ad560eb56a6d72fafff32904f8d55e1645043884b978282.apk

  • Size

    4.5MB

  • MD5

    9bdded4c57454824f7ee5d71957daadc

  • SHA1

    75009c461eef95facbb30ed3356af3859c0facf5

  • SHA256

    15fe82bd921dafbf6ad560eb56a6d72fafff32904f8d55e1645043884b978282

  • SHA512

    b7fa0ca6bec3d028c36ae7368b95d50c7148ded15a7ab397be7f18159cb9da0ed0c2695d2bfe34832164d6b775ba511ecc2f10cda16dee1a5d08c25268f417d7

  • SSDEEP

    98304:5WYjcDvnhulmbHk8BryUVpfetKhzOJ4v6nE+GpKecwRBYtaLEJjjRE:5Wc94rHp2MzOJ4vnrlfYtaLEJHG

Malware Config

Extracted

Family

hook

C2

http://80.64.30.123

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.xpyhxuqgs.fispykkus
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4285

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.xpyhxuqgs.fispykkus/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    e7e55c7981cd0d7aa9c1a4a1acc7978f

    SHA1

    ebbb6fe8bf3603b581101a203da09cdab8d1d779

    SHA256

    6c96bad8221594d94ae669e42028b3ba3e1b47ba1bf24eddfd7174aad7886d5e

    SHA512

    864b04cff8376c4a83f84a561e1368fe05b6432535a55274eb9112c8a6e3ca40df90cb00cd93e5b456312342ce0c0f3abea3f72a7ad8b05e29993fd31e6f19fc

  • /data/data/com.xpyhxuqgs.fispykkus/cache/classes.dex

    Filesize

    1.0MB

    MD5

    071606f0e0a7d458a373cdf5f206c13f

    SHA1

    a3e125d92073952fa8d9ef8fb5638df3a91217a2

    SHA256

    8cb0245d119ee31c463bcf9d2f954574c066af35a3af98de21ee84e692771bb3

    SHA512

    501bc443c9ca988b6c44ac43fa97be0446c5fa6d72cb0fc008d9b6f1302017b5c70297fe7e9399fc93d5eb1f708e7049d05aac984d8d31c14b0e6fbbea35482b

  • /data/data/com.xpyhxuqgs.fispykkus/cache/classes.zip

    Filesize

    1.0MB

    MD5

    754c307670d8f1e7e6b00cfafd65ac15

    SHA1

    905a451fb23acb79fd85ada2ec9ee8698a9c08bd

    SHA256

    9eaedf11403a4bb1732f964ad0884a433b113f7a5201a393a70528f053798102

    SHA512

    04dd70a1f7f1b528c989d39411d2aefd7d1ca809141e3991d42a3ab6df1804e769b8d0e01fab534d710161d9d25d6427d266efd6166426b5b462f6c3fbb2b001

  • /data/data/com.xpyhxuqgs.fispykkus/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.xpyhxuqgs.fispykkus/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    6b7cefc482c621cf825d7b09c4f031db

    SHA1

    976bc4e884032d4c654eb29b5642426bb9395f6f

    SHA256

    69f053cbdd9a80dd4c670d736724aab7d61e08c98f829331fc14dd058f1bedd4

    SHA512

    0d8f30be94fbde06154b7c2536da2e46cd8eb50ec9605eee629acc4303c8d965e6a68707e928648da91a876fb86607f300973c67c67b0af2740f71c0765fd7c8

  • /data/data/com.xpyhxuqgs.fispykkus/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.xpyhxuqgs.fispykkus/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    217d57b80a4a7a33971287ac51a7dc6a

    SHA1

    6c27f652ffca3afef2899a44015a430d65f79dce

    SHA256

    14c8b6388101a92be2252f3500f537c0da72ac8c9b631e4b5f60f139d67b81af

    SHA512

    389bd5d380be5599aa0d60325cc63a8673f55f8ba23ca2c3b6bf0e572452c777ce76354482a0dba2bcb8289928d1adde8cfcbfd05508d7e31cd2c6e06ea4efa0

  • /data/data/com.xpyhxuqgs.fispykkus/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    e927b2a9d3a1168c498d71ab2b69458c

    SHA1

    51287f0ebdadb4ab263cd0633480766bf5ae8972

    SHA256

    32c1c018d6de6322afb08f5f9ec9077836932b239f5a127e40e538e0c860123a

    SHA512

    537b4eee314c94a6bd0604da402c1aaae4d7074cc7588e166ff38b93187a4d3ca4484d3c8c5da4daf140e36cc9c33a33d1bfec09661cd878a05920c56571c7e8

  • /data/data/com.xpyhxuqgs.fispykkus/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    5c95d8c0e55a3c6cbdd14e0b7731062a

    SHA1

    15a3c3accf988045aefc56193d18550167cd50d4

    SHA256

    f2e084ac65fdfa84ac1086618084c0bd24e489c72b7c04d24f63e98cf2323703

    SHA512

    afd93a20b43d7acb701ffca65cf579e78ceab75c595a1506f34cf8ada58b77168a85a476b8f9d1009bc2bbf25f4c107e1cc774b0f1257bfdbc7a42bd0b9df34e