Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    09-09-2024 22:01

General

  • Target

    2d73422e4830bb79c6bd656807793d1534b508443e7156f71a833740b89841b6.apk

  • Size

    4.5MB

  • MD5

    82101fe6b79365726ddaaea86b9f5ba0

  • SHA1

    813566fdfd160d07c70316e5f508d410c79c4d5a

  • SHA256

    2d73422e4830bb79c6bd656807793d1534b508443e7156f71a833740b89841b6

  • SHA512

    d7d58e18f3584aac8eb4f3b39477d431b4afb6f76982ffb728dced84643a1d200a67a93ea8dec9019616853545677fcc86c7d63836669e3751109ac450807f85

  • SSDEEP

    98304:OFLdB0M2/Dl706ae3RS8vk+uU8v2KwTjN9zGYxsomV:OldSR06ae3inU62FTjNBxso8

Malware Config

Extracted

Family

hook

C2

http://185.147.124.43

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.oeubsymqc.ddhttzjzb
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4314
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.oeubsymqc.ddhttzjzb/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.oeubsymqc.ddhttzjzb/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4343

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.oeubsymqc.ddhttzjzb/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    11d78fbdfa0ca924ddcda125f9c65728

    SHA1

    21c3aaac5615af291056beea334312dfddb8fb71

    SHA256

    cb8a98ccecb785e5893dfc844e48c349e594e5f7270eda0d7ecea2c652608a4b

    SHA512

    d11848cf88a776f8756c344e82451feb8d803e35de999069bdcc1816b4bd3c2ead1c8fb1c63aefc1f7cb5d6754952a2f8b290fd72c2448483ab40e6bf0d27ab7

  • /data/data/com.oeubsymqc.ddhttzjzb/cache/classes.dex

    Filesize

    1.0MB

    MD5

    c41fb764b8cd8e54869a6e64c66d8044

    SHA1

    36715c5df1484345598c6fd71a7327fba1d8bbfb

    SHA256

    ee5d234e5b6e0fb2a9f6bc4b7e5d11ca2615370143db844cd0533ee4083fcb53

    SHA512

    39d27ae9ae812ea2e57799adc19b33c1b7b33f1efc7368da502b857f1bb11d4193818adba39a5183b1306f00e06d083c5dda86ee9c20af141843f56c77ae7169

  • /data/data/com.oeubsymqc.ddhttzjzb/cache/classes.zip

    Filesize

    1.0MB

    MD5

    5bb2af9324e92a15df4fe899c3f444b3

    SHA1

    4a2880cbb9d4269ed7096ead23d07176c94e2c57

    SHA256

    928a5a06a35a5de9cb2c8a4e7d8b76c17d9ba9c0377af4794b9b9c5ae558c72a

    SHA512

    948bf2099b92a02520b8c4dee1ee05d8c7b8ae8be0b6a83b43b2b7fdfe73c0a940f2e334b3279bd9d8479dd052b2bb86c5c6c7533047a7dde1e92a4a4ee5fd74

  • /data/data/com.oeubsymqc.ddhttzjzb/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.oeubsymqc.ddhttzjzb/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    c2f0bce6e41c42f0c13b9887b447d3cf

    SHA1

    59989196a4e0a463794cdf292b6607114627ca5a

    SHA256

    043a88209bd88b779694e0f6a73bab2283d8a80083e7356e071dcba7a1de0fb8

    SHA512

    272e46a749e5f5978b06ce54c7cd350ef9cacc6a737977db924019621598462f7f516b5c1c281c8dcd9c6883c2728ea74a67750a9951fe83e40a1ef85fd08b2d

  • /data/data/com.oeubsymqc.ddhttzjzb/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.oeubsymqc.ddhttzjzb/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    d7367ad9916a1727431f11fea0789f19

    SHA1

    e8b9e068b6b895f4052d214f2c3ce2185c24db8d

    SHA256

    5c278aeaed343440bfe1c5c120508b85ce602c8de2eaf9385d2185fe8125fb47

    SHA512

    2c8a31a882cbc2a78b372a3439f990f24aec55e93df32c879fe27ae0c577cc9f9bf107dd6a1c656d852daa69e7c6f4ae372b74f8718eef0c1aeec9977cf8a8ab

  • /data/data/com.oeubsymqc.ddhttzjzb/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    ac27475b6ef86bd2e1f8c6dd8277fdcc

    SHA1

    2baa597bb8f7dbb1f26cc5e001ba6e4516c6e014

    SHA256

    d505e4920502be6144fc308de88d9ca0c75cd827593b5ee30300b09ec8d7989e

    SHA512

    2d9b85e5508833596ab7cc9098268a3d93048eefbfa80f651401045be35e5177aee1c00ad48b16e9b2a6b055b51f6cc1dd22e9c85125907077a16e192704d0e0

  • /data/data/com.oeubsymqc.ddhttzjzb/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    0bf062fc33d796fbb6817fd4f19d18de

    SHA1

    100daaa09208f451e609d3c34828b7ee726f2d8a

    SHA256

    b4480814a1f1be79aa17ea9ec01f7f7ad36189f06f7c3cbc34138cf0101515f8

    SHA512

    a551c6ee1be63478d4374271be45bee0dea3cceef02af0a0b17c476796bf22ca1a6de437b77355612fe5ad73e126eaa0a68754dcf0bb8da748567c69ab41c5f2

  • /data/user/0/com.oeubsymqc.ddhttzjzb/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    bef98c2f9d71a0dee398a7416b40169c

    SHA1

    cacdb470b3e36e6a974467182a0109a8cf5d65be

    SHA256

    70062b337d2918e91b1cc28c6477601d2614234f5aa2dc1b820632fab914c88c

    SHA512

    a255a0d70fdef618d88f9c6451b9321e4e8c7b64acaa22fe5737ce40b79098f104d8472ff7055f50d45a9a83f9ff708ba33fd95a6d90f72710126711785f5f41