Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    09-09-2024 22:15

General

  • Target

    8757261be437927bbb7f0cc23381061311c407e81abb6ded542faa43a12c5318.apk

  • Size

    4.2MB

  • MD5

    8a52ebfaf7f83173190be087c3321eed

  • SHA1

    89ca74dbd4b1fea4f5a121eac91841e91bc60578

  • SHA256

    8757261be437927bbb7f0cc23381061311c407e81abb6ded542faa43a12c5318

  • SHA512

    358f0938171f8baec1ccf3b68a7eecc9df273dbe354be7753f4b231364ed1b8b0a427d49b1b2ede11c293e6c357aff3f7c996f71dbd3245199ad639e6b481190

  • SSDEEP

    98304:ZIuZdTM+JlZedlo5NFYEWEeDh2u20Z1WpfsbPQtaThWH:Zk+JlZGloLJ22uzrJQgK

Malware Config

Extracted

Family

hook

C2

http://134.255.180.156

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Reads information about phone network operator. 1 TTPs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.cowwkzbki.musaufvfw
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4771

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.cowwkzbki.musaufvfw/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    e121e7c17186aaaed8fa5378a1aae1ee

    SHA1

    9e0482e0f3a29147bc5f033c54d0e29045e940d6

    SHA256

    8c9a97d26c4881f3ffda54f5a2120dd70f854a37b829f8a13a018a1fa2aacd27

    SHA512

    52fd3750fd4a90abfb77804ba7e652dfd6a1302cb981a7cdaaac194e2836a228237a76909a1407f0394512471b3c6509009954cc9950ed82f68141b22bf43cb0

  • /data/data/com.cowwkzbki.musaufvfw/cache/classes.dex

    Filesize

    1.0MB

    MD5

    3fc088e1357b927bcdaa95d749402456

    SHA1

    1484a488333ff4b8f999f9c30e3221fa3be8fc91

    SHA256

    2f5b98535cea266646da75921f489166c91774a44aea469361a47b0a9dc8de73

    SHA512

    0af08682bc3d0987c6ba074fc4894c2854dcec99f8b6f8ed9f3f16d0d374823955da3434f1ef6395bbb1c37f16d75fc63c59c1fd14d2917d929e3b9f32447b79

  • /data/data/com.cowwkzbki.musaufvfw/cache/classes.zip

    Filesize

    1.0MB

    MD5

    0984297e37da6c17d5270fd7e682347b

    SHA1

    f3f2d6009895eae8aebad8b5ec995ce55fe3aa82

    SHA256

    97e0b2417853ac66f387a4e3b6b4c641b6aa984bd6cc19b20b11f85117214728

    SHA512

    85a3997f4bf61205e434eed5a6e4faffbb2e16097136911070186b480614d84cf8007f040fe2328c1b18a146c840ed552a64006ac8bea6ea4c40b543d3dd3db5

  • /data/data/com.cowwkzbki.musaufvfw/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.cowwkzbki.musaufvfw/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    6da3562b017a4cdc0ef26c9f27c9a092

    SHA1

    0f9bd997f172759f973b42ff7957e02b62948c97

    SHA256

    74ce370bfd3c6e24a85b3bdd34c7f018a92ddf0ea92f607015b4ecab04c3bf0c

    SHA512

    8a3606031d359a9ad9661789c1f7396b1e698b5e510f7f551907293335f05264172b08b7c0253a51be18f79bff1cc4a9d507ae07e828db172ea8aebce6baf5ce

  • /data/data/com.cowwkzbki.musaufvfw/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.cowwkzbki.musaufvfw/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    b29d953abaa8941e5617686b8411794a

    SHA1

    0d247df5f4ff8f09e78c6ee202f8f38cd1ab2366

    SHA256

    4f3fbe3f1a01e51b81aba2d7b91a59efbb9993564de9ccb5e08031df2fa26fb3

    SHA512

    1518f2681310312f18924297a0866ebe3889bb6c607ff3863279bc130991881cebaf94c9dc2e589355b0bed06d2bd5bba370760bbf69e7818c512533cbd7a812

  • /data/data/com.cowwkzbki.musaufvfw/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    6dd35ead847835297eb57273dd63f309

    SHA1

    c3dc32f804f0e114b228c7130dc4ea339c745ca9

    SHA256

    1080517d50857c5e232b896cbca2905e49b893a19485b0f9157c0c50d533194c

    SHA512

    91fc226aa7100a458051f9e0cc0558eaca0accb2195800b904a8e50e5e71c98bba10a84b3c5339dd3857b7843fb78f2de0cc7c83ee4ceeccad20a65b150ce319

  • /data/data/com.cowwkzbki.musaufvfw/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    8e5e2e777ed9b70bc390927a00c70fa9

    SHA1

    76775a56e2e4a922e2f3d1a5532dbd40ba9b726c

    SHA256

    8780e3e38b998494a2ad8c64595ce9b3bfcf7d4faf9f4060f59b193350bc0cf2

    SHA512

    208ffe0f94d381e3d04ee3c48315f40389d6f05f30b2c2f71111a4677fe71a20199c63f7aef56271b09f0cdd4c6e2f1a7179cae46768cc6ddfdd3e59f49185b0