Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    android-10_x64
  • resource
    android-x64-20240910-en
  • resource tags

    arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system
  • submitted
    09-09-2024 22:15

General

  • Target

    8757261be437927bbb7f0cc23381061311c407e81abb6ded542faa43a12c5318.apk

  • Size

    4.2MB

  • MD5

    8a52ebfaf7f83173190be087c3321eed

  • SHA1

    89ca74dbd4b1fea4f5a121eac91841e91bc60578

  • SHA256

    8757261be437927bbb7f0cc23381061311c407e81abb6ded542faa43a12c5318

  • SHA512

    358f0938171f8baec1ccf3b68a7eecc9df273dbe354be7753f4b231364ed1b8b0a427d49b1b2ede11c293e6c357aff3f7c996f71dbd3245199ad639e6b481190

  • SSDEEP

    98304:ZIuZdTM+JlZedlo5NFYEWEeDh2u20Z1WpfsbPQtaThWH:Zk+JlZGloLJ22uzrJQgK

Malware Config

Extracted

Family

hook

C2

http://134.255.180.156

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.cowwkzbki.musaufvfw
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:5068

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.cowwkzbki.musaufvfw/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    e121e7c17186aaaed8fa5378a1aae1ee

    SHA1

    9e0482e0f3a29147bc5f033c54d0e29045e940d6

    SHA256

    8c9a97d26c4881f3ffda54f5a2120dd70f854a37b829f8a13a018a1fa2aacd27

    SHA512

    52fd3750fd4a90abfb77804ba7e652dfd6a1302cb981a7cdaaac194e2836a228237a76909a1407f0394512471b3c6509009954cc9950ed82f68141b22bf43cb0

  • /data/data/com.cowwkzbki.musaufvfw/cache/classes.dex

    Filesize

    1.0MB

    MD5

    3fc088e1357b927bcdaa95d749402456

    SHA1

    1484a488333ff4b8f999f9c30e3221fa3be8fc91

    SHA256

    2f5b98535cea266646da75921f489166c91774a44aea469361a47b0a9dc8de73

    SHA512

    0af08682bc3d0987c6ba074fc4894c2854dcec99f8b6f8ed9f3f16d0d374823955da3434f1ef6395bbb1c37f16d75fc63c59c1fd14d2917d929e3b9f32447b79

  • /data/data/com.cowwkzbki.musaufvfw/cache/classes.zip

    Filesize

    1.0MB

    MD5

    0984297e37da6c17d5270fd7e682347b

    SHA1

    f3f2d6009895eae8aebad8b5ec995ce55fe3aa82

    SHA256

    97e0b2417853ac66f387a4e3b6b4c641b6aa984bd6cc19b20b11f85117214728

    SHA512

    85a3997f4bf61205e434eed5a6e4faffbb2e16097136911070186b480614d84cf8007f040fe2328c1b18a146c840ed552a64006ac8bea6ea4c40b543d3dd3db5

  • /data/data/com.cowwkzbki.musaufvfw/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.cowwkzbki.musaufvfw/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    213615282d5a9babbaad4fc7820cd3af

    SHA1

    39e4e07c1d295facf1dcc5fe288a5f687d28946a

    SHA256

    7d58904d2c247ae2a74c6f740a9965b432597b96269d4e42a5fb5807f19912f7

    SHA512

    30ed41c85f4f3aadf6542dc0dd52b445dcad5639e0ec33806b5b393ce07a252fcf1c377768da2ac4d6bf36afc6e3adbe858e18c570d368c4b8c5e9b7498ce99c

  • /data/data/com.cowwkzbki.musaufvfw/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.cowwkzbki.musaufvfw/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    f14d3235f577569a7c70c2c06d336cc0

    SHA1

    1a3514503f901fc292b466c13c40462fdc550d8d

    SHA256

    ce0c1d8243f6d2076b2b5bb4d9815706db41c3c882e61ffb68f0762765216f18

    SHA512

    52ead8986432d843aa41361c3cae4f8eaa71a5540c9f83c7775c9845d691543b73c8b747596397c3c5a43ca6f3243924d6571d06804e5657f54dba62050a8a78

  • /data/data/com.cowwkzbki.musaufvfw/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    5159f48f3276979d76da0f9062b7a873

    SHA1

    87a2af29b50c71df3696678897d8fefd5fc31f81

    SHA256

    367a29bb4d52ba80759052afad8f8f9c3f66c821d9184e8aad75bf0898db30c2

    SHA512

    4915f513af4ea9bef6af5e01da905ce732da56bb60b164de0a70273fa5152fe031902ab11054e552ce0930345e7a351b9b39823c3753b4f423d029a93bf5b29f

  • /data/data/com.cowwkzbki.musaufvfw/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    df00a6da6d60a48af68757dc99b804c7

    SHA1

    83da7a0a744148f7c1f046876c3512ebb5e90b16

    SHA256

    9c8a50d2b75161673f8f4b0366aec70152feb0edaec48f57016510087286ba8d

    SHA512

    7b5e8a0f230ea65ba16b2df791b9ded504a78c2ff3681bf766b8dd08490ed8b67e454e46603ee349a10bf7a840d3c863eafd083918123fcb71ba3d308cec5375