Analysis

  • max time kernel
    147s
  • max time network
    157s
  • platform
    android_x64
  • resource
    android-x64-20240624-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system
  • submitted
    10-09-2024 22:23

General

  • Target

    f4aa091e7ad26030573b337504f629bb23a183ad9e229d1c0d49f3452db6e9af.apk

  • Size

    4.3MB

  • MD5

    e4db988325d5cd27732c83de97dc3ca0

  • SHA1

    748580afb97646a453f81c4c05ffdb8111b9fb0a

  • SHA256

    f4aa091e7ad26030573b337504f629bb23a183ad9e229d1c0d49f3452db6e9af

  • SHA512

    6031e1857c2b4c0b8df05d229f89bd1ac67dc7989880cef23ed2ae944d2de4f2802f5f06cc55a0cdf2e862bc5fbeaadd9e3074378a04b0ca372885f2e8da6f8b

  • SSDEEP

    98304:4Ia66C3aiYw7VGLJUXbtfF4gdAyEIvki6bTHz33CcbRjM393Om/l:4Ia66C3aiYw7QLgFVfq1zHzbNM4mt

Malware Config

Extracted

Family

hook

C2

http://vbh1hfye1gf.live

http://nb2hgj2ui.pro

http://ssd3ffg3rrt.xyz

http://xsd4rfv4tre.xyz

http://xcv5vcx5rty.live

http://vfgt6re6tghj.xyz

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.brtqygziv.kfnjmzbqo
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4949

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.brtqygziv.kfnjmzbqo/app_dex/classes.dex

    Filesize

    2.1MB

    MD5

    25b17e4c71e728311192c092d1e52738

    SHA1

    709d42f2bec91b6ddbc2867345e17b023bef04d1

    SHA256

    e61d8d01d204bf3fa62abbc5dbe6354fa4a29f9957a465c3ec7a2ff454cc6c80

    SHA512

    3bdd193fa13901853b59bedc654c61d933121d5e4d5430b52cbfe347ebbc5cc0f79103bb1574c78ecf1ca6bb95720e3f8318ac8279b7f4c4f0ff19a1d81eae66

  • /data/data/com.brtqygziv.kfnjmzbqo/cache/classes.dex

    Filesize

    999KB

    MD5

    aa0d40ae41515ebf050afc1288656a9c

    SHA1

    568a8f2c0483ec701874de9f520669b4a3f34807

    SHA256

    9a1183abfc451cc6cd5c668b5264a3eb04685fd859ac2817d11b58983dbb2af3

    SHA512

    8c9262a849113862459a0c57ec85204de328a176d320f97663eadd5896b652473261c009e6f07a1c270a093cace18f47a13bee5bd11551c781c404e41f2cfc31

  • /data/data/com.brtqygziv.kfnjmzbqo/cache/classes.zip

    Filesize

    999KB

    MD5

    2286fb4f7d4438b61b354733927b0f45

    SHA1

    ada391fcbc88bb5ebd58258504f6fcf92bc5b4a4

    SHA256

    d2f1ef6d1dee9c7729199ec4dfd4eb82600e2bfaa68a58705001bca6540f059c

    SHA512

    ee4b4619b34bcd33fc8c61aa66f5c7cb1f1f4ac02f4a831b3c286c0ebe75ccdc5552aac7aae9d5db613d3528801fb90c45b3490924b7ed8a140795aba0ffa3cb

  • /data/data/com.brtqygziv.kfnjmzbqo/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.brtqygziv.kfnjmzbqo/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    5e1848b7673515ff5b675a87abd7c4dc

    SHA1

    824e9a5b9caf22118207bd0e7fc4c44f45223e2c

    SHA256

    6e473b8d78ccc47a6569c962c8ee590352f22f3feaf77f0590e9a6d4196e11c0

    SHA512

    38d0a85b616fa68d3c70d6280f11e20727a61d4e6075d651a17557b70cc727fb10b9be7bd1f75a512f8eddbf03053748fe69de2cf60fb40efae73a1b128bd235

  • /data/data/com.brtqygziv.kfnjmzbqo/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.brtqygziv.kfnjmzbqo/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    673f2de6f51297729d8f7ce1232fc9be

    SHA1

    92135e26e78828bf46480e63375832c341fbe545

    SHA256

    1f68a43a11d23af2a39d5af5ce2dce65dc5c2439cc5c5d555cebd06a7a6fe520

    SHA512

    f05062cea9871ced15dd233403c4536a86c9c6b2093364e9cf3557de00c77becfb841900ee7b86ef2d3992d64fc75d2974e3f157805571de477436ab84c08774

  • /data/data/com.brtqygziv.kfnjmzbqo/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    6fd8ca2bf101bfe00b67a7de7c2201d6

    SHA1

    b28103e90a66276c6807b9eefa5e72f2e79b4d45

    SHA256

    8f23354c85a185e889e37852399cae40155f9f16b9f7c379ec18eda5be70ceae

    SHA512

    a66bfcc1934b111e9c2fbc2a438efee929ccb3aefc38cee529ab6b9df76f88fbef1a0f0c60b2479d3fe5456eb5e5dc0212fbc83946ceea1850d477c18125648c

  • /data/data/com.brtqygziv.kfnjmzbqo/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    c2c533f21fd5223f5ee569b80752af31

    SHA1

    1727a8061a820e10f73ceec06b008a0dd23a7ae8

    SHA256

    55dd26c7b247ac4800bff39a112649365dffc37c7058ea3ff3cbf19a5828f375

    SHA512

    0fcbeb6c931fcf99e716591d2795c32861f8876adf8505975cc070ce977524a063a984e9c36fbe28078a133acc31ab4b96e91d63320defde4fd8dc8e3ec1678a