Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    08-09-2024 22:25

General

  • Target

    15fe82bd921dafbf6ad560eb56a6d72fafff32904f8d55e1645043884b978282.apk

  • Size

    4.5MB

  • MD5

    9bdded4c57454824f7ee5d71957daadc

  • SHA1

    75009c461eef95facbb30ed3356af3859c0facf5

  • SHA256

    15fe82bd921dafbf6ad560eb56a6d72fafff32904f8d55e1645043884b978282

  • SHA512

    b7fa0ca6bec3d028c36ae7368b95d50c7148ded15a7ab397be7f18159cb9da0ed0c2695d2bfe34832164d6b775ba511ecc2f10cda16dee1a5d08c25268f417d7

  • SSDEEP

    98304:5WYjcDvnhulmbHk8BryUVpfetKhzOJ4v6nE+GpKecwRBYtaLEJjjRE:5Wc94rHp2MzOJ4vnrlfYtaLEJHG

Malware Config

Extracted

Family

hook

C2

http://80.64.30.123

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Reads information about phone network operator. 1 TTPs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.xpyhxuqgs.fispykkus
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4740

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.xpyhxuqgs.fispykkus/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    e7e55c7981cd0d7aa9c1a4a1acc7978f

    SHA1

    ebbb6fe8bf3603b581101a203da09cdab8d1d779

    SHA256

    6c96bad8221594d94ae669e42028b3ba3e1b47ba1bf24eddfd7174aad7886d5e

    SHA512

    864b04cff8376c4a83f84a561e1368fe05b6432535a55274eb9112c8a6e3ca40df90cb00cd93e5b456312342ce0c0f3abea3f72a7ad8b05e29993fd31e6f19fc

  • /data/data/com.xpyhxuqgs.fispykkus/cache/classes.dex

    Filesize

    1.0MB

    MD5

    071606f0e0a7d458a373cdf5f206c13f

    SHA1

    a3e125d92073952fa8d9ef8fb5638df3a91217a2

    SHA256

    8cb0245d119ee31c463bcf9d2f954574c066af35a3af98de21ee84e692771bb3

    SHA512

    501bc443c9ca988b6c44ac43fa97be0446c5fa6d72cb0fc008d9b6f1302017b5c70297fe7e9399fc93d5eb1f708e7049d05aac984d8d31c14b0e6fbbea35482b

  • /data/data/com.xpyhxuqgs.fispykkus/cache/classes.zip

    Filesize

    1.0MB

    MD5

    754c307670d8f1e7e6b00cfafd65ac15

    SHA1

    905a451fb23acb79fd85ada2ec9ee8698a9c08bd

    SHA256

    9eaedf11403a4bb1732f964ad0884a433b113f7a5201a393a70528f053798102

    SHA512

    04dd70a1f7f1b528c989d39411d2aefd7d1ca809141e3991d42a3ab6df1804e769b8d0e01fab534d710161d9d25d6427d266efd6166426b5b462f6c3fbb2b001

  • /data/data/com.xpyhxuqgs.fispykkus/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.xpyhxuqgs.fispykkus/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    c548b75b6d33a4696df2ff4d3026ecc6

    SHA1

    87293a891a7c5d757dc44ab9155b728225b6cb16

    SHA256

    8d797555f58d887f05d78012c87357fd9f97bc7e722a017b2ec464554b4b685b

    SHA512

    54de156ec491537d5d9d27171a3d0a38da0b71fecfc56f0b3d4c51240c390e38882fb37d853953536c74915290795075559821169d889a023434afc86b223d69

  • /data/data/com.xpyhxuqgs.fispykkus/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.xpyhxuqgs.fispykkus/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    a3d09420a1be3b9c0f9c90fa18446c22

    SHA1

    8355bf074488c9d34ba1d5dd00d66e0b2d3fbdd1

    SHA256

    c241765e7145e845f1d774f298acbd1be5e2327a8eb295b122afedaab7bc323e

    SHA512

    c16215675fd68de02921cd9d9e9b2160bdcd39716d159254e40691215ad144a95142829e2df7154daf4a0178cf8c60fd4b9f453612c081522886ff0683a7757e

  • /data/data/com.xpyhxuqgs.fispykkus/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    a753643ac76287f517a37c87b5ba6ff0

    SHA1

    a134c60ad632a55f00dab2348ef9187098b0813d

    SHA256

    3e0b7e2f15e06785957af0123499e5e2c484780bb750332dcdc2c9b42fb5c21d

    SHA512

    0f4637bf5ce253585cd5e460094c75f9c45d21bef2ee2d45810d5f2a2e71f7a5f043357206c2e81c85f470fe8aef65c8279303789f8cdce117f0d6c6accb2488

  • /data/data/com.xpyhxuqgs.fispykkus/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    28b5fc4c69165e63ad9a87d9afeaa507

    SHA1

    da1e21c8c9a4a6eb3b9cf40a5301fc2b825d2d20

    SHA256

    53a5e41362285741502056909844214dba44b604b3a00f65add1434eec8a4f25

    SHA512

    00c8196cc1a37beee8df8820cd61026ab3d16763bbbd725cb35bf3d81ef0791e6d05e1db2b3ecfb1f62dd1277c3cf5899868ff060b9b58fef1c84021a2e46691