Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    11-09-2024 22:08

General

  • Target

    e30552f81269ad6116454b448a84902aa3455ef26fe4134d158c88237ccab14c.apk

  • Size

    4.3MB

  • MD5

    760ed7289d1653034906cf36b7f8f86b

  • SHA1

    e7ee0071eb34934711a54293cad29d7ac6402750

  • SHA256

    e30552f81269ad6116454b448a84902aa3455ef26fe4134d158c88237ccab14c

  • SHA512

    17e76dff6e5357d5c5064123c21a39e97e8cd6db1a26a779e6587b58954bf8bb41f4b3879a223f03a09aa66f1669072efdde31c01305c8c670cc4f100cf2988e

  • SSDEEP

    98304:s2BzO3dfjsT+ZAhUrRCXHVbzr+XuLd7nbYvcc47VtU/2/:/O3dfomAarsXHRzSXuL+vYVtL/

Malware Config

Extracted

Family

hook

C2

http://xds3njsqop.xyz

http://mnj4poxsrd.live

http://swxmj5io.pro

http://ioxsmjr6r.xyz

http://xr7mkokwsq.xyz

http://mbnj8uyjg.live

http://ewr2ionmxz.xyz

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.vucmlxwza.sjxhvhwrw
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4268
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.vucmlxwza.sjxhvhwrw/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.vucmlxwza.sjxhvhwrw/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4298

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.vucmlxwza.sjxhvhwrw/app_dex/classes.dex

    Filesize

    2.0MB

    MD5

    b654dccda70e93f25c2a79aa3a7daa51

    SHA1

    146935cea6addb94bd72d8d52cb11cacd67d4c69

    SHA256

    ca9046a9e27ea7bd25e2db488076a44aa060b165fda0df248fb8c308fed0588f

    SHA512

    ce41e6b27a9fbf7c890b211dd1fe1dd0835714b0b5605469b8d2e53ff0a910210653071ed347b811e4afa3ba1b18a1ea0cbd9a7c9680a84f0e3227ac156a9691

  • /data/data/com.vucmlxwza.sjxhvhwrw/cache/classes.dex

    Filesize

    984KB

    MD5

    e0a92432b94748111aadc99199dd3d2c

    SHA1

    2c9fef7a837850783e3e9b69127c9a596c05c544

    SHA256

    97e2bc2ab28c58dc19aea09abf2c6b41c6e611008090fe2b4f47588a458365f5

    SHA512

    d0ee15007b325b7911b5fc7fb841e8908c8d5f8fdb44c956ca0fffe6292faebde3c3f0b89e33612e59ffb6c46cb0d7bf4d66858f1777ec5b98b5f992b5019231

  • /data/data/com.vucmlxwza.sjxhvhwrw/cache/classes.zip

    Filesize

    984KB

    MD5

    2be50b9e28cbe47c8fd8091ca82ffe2b

    SHA1

    09559db3b2550bf80de30f322af7a0e67d80f6f6

    SHA256

    7b018bc58c54200c706e725ba5f1631e67310acd09b614d90ef4beb30555b377

    SHA512

    8e5ed6cb54cd91a8c41e514e48250d8a2313e1dbdc4a618c96dd14e6ccee86cb85c9595c52556c602f8ae48fa681823b8e63e916a0642af601455aef31aa20e9

  • /data/data/com.vucmlxwza.sjxhvhwrw/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.vucmlxwza.sjxhvhwrw/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    905aa2022dc3a0a444fbe90280773807

    SHA1

    3d032861567df20e07cd165d13b4907cf16c047d

    SHA256

    bda8eb5ff802c8f9514d0a9fc01a9d9e8f9247d18dd83a6f9b820ac096b3480b

    SHA512

    9801828030b1de61b6e0ee48fdaf93c562e493425198e2517c100d39c85a071cbe9425f9faf3859487be7a343742bf7375ddbb3fa2a8afb6a594f3ddd041bfda

  • /data/data/com.vucmlxwza.sjxhvhwrw/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.vucmlxwza.sjxhvhwrw/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    06bc158b856c82ea64769cda00e06df2

    SHA1

    e9b42267cd5fb0b389bbbe76272a3bd5642b8904

    SHA256

    14a30673dd365a33c657821765fe9e9a499fed2794f5da76364509b9381189fd

    SHA512

    1b9ac35d592c12448dd8f52fbe08544f1cad0c7f2ea2f9eb12c01e4b22bf49519b64df1c6fe9fdd5a8c6b8ca0a69b1c9210f726d40c358e5b1d369dda32442eb

  • /data/data/com.vucmlxwza.sjxhvhwrw/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    f99aa2b522df3da1ca75dbb158258b69

    SHA1

    fed78b50f9a65c2f4fb13785edee3f59670bc0bb

    SHA256

    e65b2c71e0f945415d70b827395065d4d2934f4997f287004f1c1ca8dc31833e

    SHA512

    44ef6ef6a0db268788c78576b5a286c14509554d1abc801df8be2052140045c3dc956af1d2f585001e75eb56bd8651738a25e9d6944614b9926853943be7e755

  • /data/data/com.vucmlxwza.sjxhvhwrw/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    d5c234c4b9f15f944bf7ac011733a20d

    SHA1

    928e9d1df5b77b9ce8f1c2cffa9fc8ba428e7c58

    SHA256

    17088bd9967adbe3fa61ce4bbde5efa641d42b55d8e4cfe62ff1aa3a9985af97

    SHA512

    6f750868efa03dfa7f31ac8d1d5df4e7018a42ab181955b59c64e38dee2c7c42014ff504e5848c81d3cc08eee626c06699119c0765f10e0934354251e6fc63fc

  • /data/user/0/com.vucmlxwza.sjxhvhwrw/app_dex/classes.dex

    Filesize

    2.0MB

    MD5

    a6fdcb72cf5ecb61aa275ef0bf90b940

    SHA1

    3be6e5d3727edcabe22a8175b0257a7ee7ba7b1e

    SHA256

    c82ab0d5a67e381b50947ac675575fbd86d343ebd55d8a1e7eb303aaf3313bea

    SHA512

    9044fb15cc924470295c040ab580b04b82355752cd173644ce7e003465628a3e7483e3609e230b000ecd166c210ed90d34d6bd2f52d59531852d6dc8bda9731c