Analysis

  • max time kernel
    145s
  • max time network
    133s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    10-09-2024 22:23

General

  • Target

    f4aa091e7ad26030573b337504f629bb23a183ad9e229d1c0d49f3452db6e9af.apk

  • Size

    4.3MB

  • MD5

    e4db988325d5cd27732c83de97dc3ca0

  • SHA1

    748580afb97646a453f81c4c05ffdb8111b9fb0a

  • SHA256

    f4aa091e7ad26030573b337504f629bb23a183ad9e229d1c0d49f3452db6e9af

  • SHA512

    6031e1857c2b4c0b8df05d229f89bd1ac67dc7989880cef23ed2ae944d2de4f2802f5f06cc55a0cdf2e862bc5fbeaadd9e3074378a04b0ca372885f2e8da6f8b

  • SSDEEP

    98304:4Ia66C3aiYw7VGLJUXbtfF4gdAyEIvki6bTHz33CcbRjM393Om/l:4Ia66C3aiYw7QLgFVfq1zHzbNM4mt

Malware Config

Extracted

Family

hook

C2

http://vbh1hfye1gf.live

http://nb2hgj2ui.pro

http://ssd3ffg3rrt.xyz

http://xsd4rfv4tre.xyz

http://xcv5vcx5rty.live

http://vfgt6re6tghj.xyz

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Reads information about phone network operator. 1 TTPs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.brtqygziv.kfnjmzbqo
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4446

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.brtqygziv.kfnjmzbqo/app_dex/classes.dex

    Filesize

    2.1MB

    MD5

    25b17e4c71e728311192c092d1e52738

    SHA1

    709d42f2bec91b6ddbc2867345e17b023bef04d1

    SHA256

    e61d8d01d204bf3fa62abbc5dbe6354fa4a29f9957a465c3ec7a2ff454cc6c80

    SHA512

    3bdd193fa13901853b59bedc654c61d933121d5e4d5430b52cbfe347ebbc5cc0f79103bb1574c78ecf1ca6bb95720e3f8318ac8279b7f4c4f0ff19a1d81eae66

  • /data/data/com.brtqygziv.kfnjmzbqo/cache/classes.dex

    Filesize

    999KB

    MD5

    aa0d40ae41515ebf050afc1288656a9c

    SHA1

    568a8f2c0483ec701874de9f520669b4a3f34807

    SHA256

    9a1183abfc451cc6cd5c668b5264a3eb04685fd859ac2817d11b58983dbb2af3

    SHA512

    8c9262a849113862459a0c57ec85204de328a176d320f97663eadd5896b652473261c009e6f07a1c270a093cace18f47a13bee5bd11551c781c404e41f2cfc31

  • /data/data/com.brtqygziv.kfnjmzbqo/cache/classes.zip

    Filesize

    999KB

    MD5

    2286fb4f7d4438b61b354733927b0f45

    SHA1

    ada391fcbc88bb5ebd58258504f6fcf92bc5b4a4

    SHA256

    d2f1ef6d1dee9c7729199ec4dfd4eb82600e2bfaa68a58705001bca6540f059c

    SHA512

    ee4b4619b34bcd33fc8c61aa66f5c7cb1f1f4ac02f4a831b3c286c0ebe75ccdc5552aac7aae9d5db613d3528801fb90c45b3490924b7ed8a140795aba0ffa3cb

  • /data/data/com.brtqygziv.kfnjmzbqo/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.brtqygziv.kfnjmzbqo/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    08c9177dfc0f96ecb1e4d0186f55c386

    SHA1

    6ed950e4f97f5d10c506e5ebd9c52cb446f947e2

    SHA256

    28346621c02ee1f456f15f1841c3ebe84de908ac085bf705c71eaa98b09149d4

    SHA512

    78a3a195150b4311a7d265fa9443a7a48fa854e20160f58a036de32b823814fb26dc855240325f1dbada65665995db6c90853ba5afc69327f7a535283b8690f5

  • /data/data/com.brtqygziv.kfnjmzbqo/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.brtqygziv.kfnjmzbqo/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    3c629fd802085dadd01bc5343f127b05

    SHA1

    13da89aee4ff143b45b931dc1549fcae0eef448c

    SHA256

    ddc674ba263aa7d07a59f7ecf828a9589f78410f1c6e46195d9c1d2664d28492

    SHA512

    945fb405266f870b371846dbde584ca41db190709d64f0beedd35065fd424284474d1ad6a95fcc50823b1974657a9c545e4d3bc7fc1e073a5aad31aaf3f428dd

  • /data/data/com.brtqygziv.kfnjmzbqo/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    f72fc3a448fceda1617a96b6a76572eb

    SHA1

    acffeb61ed1af135f2aa7c113e9966acd861c2bd

    SHA256

    d0f70fa9a33fa5930933bf55f4cf517ab6b1dfa6599477d2809bcf440bfb07e0

    SHA512

    a81744a6b00df492a244269e1a42a386b554bc2b7c07d4cc39f63b195253e58aba5fd3c7d7d823a9df6a8a8efaa5309e76e53fde4d10368419b22b53e2093374

  • /data/data/com.brtqygziv.kfnjmzbqo/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    62b61f2b60cd78c2892dbfe694462142

    SHA1

    33ff89e1c7ba816f7079d866b43bbba74c936c46

    SHA256

    11bf1980270b444a026869fb6ab03aaacd8b774e6498b514468dd733af7e12a4

    SHA512

    5c9b0001713ca05fa82363a6aa03ae774221ab7d9b184d145b72a9e6c76997a7f90974f851f69cf78f2c107e0ac7924ca4f0366b46f5604fca6b8396039233d3