Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    09-09-2024 22:01

General

  • Target

    2d73422e4830bb79c6bd656807793d1534b508443e7156f71a833740b89841b6.apk

  • Size

    4.5MB

  • MD5

    82101fe6b79365726ddaaea86b9f5ba0

  • SHA1

    813566fdfd160d07c70316e5f508d410c79c4d5a

  • SHA256

    2d73422e4830bb79c6bd656807793d1534b508443e7156f71a833740b89841b6

  • SHA512

    d7d58e18f3584aac8eb4f3b39477d431b4afb6f76982ffb728dced84643a1d200a67a93ea8dec9019616853545677fcc86c7d63836669e3751109ac450807f85

  • SSDEEP

    98304:OFLdB0M2/Dl706ae3RS8vk+uU8v2KwTjN9zGYxsomV:OldSR06ae3inU62FTjNBxso8

Malware Config

Extracted

Family

hook

C2

http://185.147.124.43

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 17 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.oeubsymqc.ddhttzjzb
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4776

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.oeubsymqc.ddhttzjzb/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    11d78fbdfa0ca924ddcda125f9c65728

    SHA1

    21c3aaac5615af291056beea334312dfddb8fb71

    SHA256

    cb8a98ccecb785e5893dfc844e48c349e594e5f7270eda0d7ecea2c652608a4b

    SHA512

    d11848cf88a776f8756c344e82451feb8d803e35de999069bdcc1816b4bd3c2ead1c8fb1c63aefc1f7cb5d6754952a2f8b290fd72c2448483ab40e6bf0d27ab7

  • /data/data/com.oeubsymqc.ddhttzjzb/cache/classes.dex

    Filesize

    1.0MB

    MD5

    c41fb764b8cd8e54869a6e64c66d8044

    SHA1

    36715c5df1484345598c6fd71a7327fba1d8bbfb

    SHA256

    ee5d234e5b6e0fb2a9f6bc4b7e5d11ca2615370143db844cd0533ee4083fcb53

    SHA512

    39d27ae9ae812ea2e57799adc19b33c1b7b33f1efc7368da502b857f1bb11d4193818adba39a5183b1306f00e06d083c5dda86ee9c20af141843f56c77ae7169

  • /data/data/com.oeubsymqc.ddhttzjzb/cache/classes.zip

    Filesize

    1.0MB

    MD5

    5bb2af9324e92a15df4fe899c3f444b3

    SHA1

    4a2880cbb9d4269ed7096ead23d07176c94e2c57

    SHA256

    928a5a06a35a5de9cb2c8a4e7d8b76c17d9ba9c0377af4794b9b9c5ae558c72a

    SHA512

    948bf2099b92a02520b8c4dee1ee05d8c7b8ae8be0b6a83b43b2b7fdfe73c0a940f2e334b3279bd9d8479dd052b2bb86c5c6c7533047a7dde1e92a4a4ee5fd74

  • /data/data/com.oeubsymqc.ddhttzjzb/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.oeubsymqc.ddhttzjzb/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    a5e1867c9d8852d67e90f7182124a8f7

    SHA1

    9fc629d373182e096e40bc80eb22420536f1490d

    SHA256

    f7ff47a226064e230d90eaa0f3a6964ffee28bd595added40a08e402549709ea

    SHA512

    db2ea38b73d37b3fc5280380676d3c02df64ce0b0b046b99c4dfee66374046ffc4a6471056984f5fd37f40cc4613e427d73f41ce78163ce3fcd5175658ee929c

  • /data/data/com.oeubsymqc.ddhttzjzb/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.oeubsymqc.ddhttzjzb/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    8c1a22b662edbe42d7e8846e8ac787b8

    SHA1

    c0144cd66574d1ea4819947584bfdd4cc3acde24

    SHA256

    d60a0150a3f3ce2f273b76417e924514a7d83a64fe3d0b8948635b9c527d4288

    SHA512

    9ef76b696135c62d8ff64b823d6a5212fba552ac5239c9d2ade4e30e1e35e5014f5133b058ecdba0ef4f81bf820379af4e4bfbeb6641e748eb165757c0874061

  • /data/data/com.oeubsymqc.ddhttzjzb/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    3f55da2412eb9bcdfac55d75f02eb800

    SHA1

    28f2d5efbf490551738c8f14ea3248808497e0b1

    SHA256

    a326c308e44d8dc24572dea1e35ba1f1b5a4ffa12201a50bb12d73f34b0285ed

    SHA512

    0d8316a06c16d5a3a046d15b1896197b587b1e411f2b5a7dabf96b9d0e950e755efa6421c892b97b22dd13f7aab5badd9612135bdbd07bb7b3d9002ddd41c3ed

  • /data/data/com.oeubsymqc.ddhttzjzb/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    4cef23846b92fdfb530bfb9993cc4d94

    SHA1

    04fdab1a96c863787ba53c344a408d9411649d22

    SHA256

    c0906c58aa6ca928a62a64516915bfe1a519e2170b37be5e2eea95fee22405ab

    SHA512

    e9f1d29b35d42a2a373a6b061f640a01cc2a7c9fb917db800126a61fa29347421135269d363fdfda4f45163a3c9f5032abd644c57043f8b358f0984bdbbb541d