Analysis

  • max time kernel
    72s
  • max time network
    151s
  • platform
    android-10_x64
  • resource
    android-x64-20240910-en
  • resource tags

    arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system
  • submitted
    11-09-2024 22:08

General

  • Target

    e30552f81269ad6116454b448a84902aa3455ef26fe4134d158c88237ccab14c.apk

  • Size

    4.3MB

  • MD5

    760ed7289d1653034906cf36b7f8f86b

  • SHA1

    e7ee0071eb34934711a54293cad29d7ac6402750

  • SHA256

    e30552f81269ad6116454b448a84902aa3455ef26fe4134d158c88237ccab14c

  • SHA512

    17e76dff6e5357d5c5064123c21a39e97e8cd6db1a26a779e6587b58954bf8bb41f4b3879a223f03a09aa66f1669072efdde31c01305c8c670cc4f100cf2988e

  • SSDEEP

    98304:s2BzO3dfjsT+ZAhUrRCXHVbzr+XuLd7nbYvcc47VtU/2/:/O3dfomAarsXHRzSXuL+vYVtL/

Malware Config

Extracted

Family

hook

C2

http://xds3njsqop.xyz

http://mnj4poxsrd.live

http://swxmj5io.pro

http://ioxsmjr6r.xyz

http://xr7mkokwsq.xyz

http://mbnj8uyjg.live

http://ewr2ionmxz.xyz

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.vucmlxwza.sjxhvhwrw
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:5229

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.vucmlxwza.sjxhvhwrw/app_dex/classes.dex

    Filesize

    2.0MB

    MD5

    b654dccda70e93f25c2a79aa3a7daa51

    SHA1

    146935cea6addb94bd72d8d52cb11cacd67d4c69

    SHA256

    ca9046a9e27ea7bd25e2db488076a44aa060b165fda0df248fb8c308fed0588f

    SHA512

    ce41e6b27a9fbf7c890b211dd1fe1dd0835714b0b5605469b8d2e53ff0a910210653071ed347b811e4afa3ba1b18a1ea0cbd9a7c9680a84f0e3227ac156a9691

  • /data/data/com.vucmlxwza.sjxhvhwrw/cache/classes.dex

    Filesize

    984KB

    MD5

    e0a92432b94748111aadc99199dd3d2c

    SHA1

    2c9fef7a837850783e3e9b69127c9a596c05c544

    SHA256

    97e2bc2ab28c58dc19aea09abf2c6b41c6e611008090fe2b4f47588a458365f5

    SHA512

    d0ee15007b325b7911b5fc7fb841e8908c8d5f8fdb44c956ca0fffe6292faebde3c3f0b89e33612e59ffb6c46cb0d7bf4d66858f1777ec5b98b5f992b5019231

  • /data/data/com.vucmlxwza.sjxhvhwrw/cache/classes.zip

    Filesize

    984KB

    MD5

    2be50b9e28cbe47c8fd8091ca82ffe2b

    SHA1

    09559db3b2550bf80de30f322af7a0e67d80f6f6

    SHA256

    7b018bc58c54200c706e725ba5f1631e67310acd09b614d90ef4beb30555b377

    SHA512

    8e5ed6cb54cd91a8c41e514e48250d8a2313e1dbdc4a618c96dd14e6ccee86cb85c9595c52556c602f8ae48fa681823b8e63e916a0642af601455aef31aa20e9

  • /data/data/com.vucmlxwza.sjxhvhwrw/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.vucmlxwza.sjxhvhwrw/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    65cab3005a3ee8004bbdf3feebb51247

    SHA1

    92f18243d43240e445e100c3ab326f6d3efcb9a4

    SHA256

    c904dce04459d44eca1bf8f86e9250df232adf6bf96f6b167ffe28117c9c7e13

    SHA512

    5455882dd7cfc7a629f94b4590fcd3dbc854bab897818230cff1943058376f19f2611a79f804167990ca20db678a19ca9c74befe2f8f96bbd172ef9d509ca6b9

  • /data/data/com.vucmlxwza.sjxhvhwrw/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.vucmlxwza.sjxhvhwrw/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    602f36cf9d07d3c127403a89a7f8821f

    SHA1

    b2b579059511289fbde8ca56321737ac6e086930

    SHA256

    78c7830532702586741ae0a0a8e927d1a5aef3fcf97fe33d72755df77fcbf9b1

    SHA512

    821332bf132bdb15142dcb8e415705a041c153b009076116c541b2b3fa0ceaa36676e9bcfa4965285003fb48dd6be514b920c73b31a79c7fff8c29ca86c020a7

  • /data/data/com.vucmlxwza.sjxhvhwrw/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    eb74646a0165ecf7d0d2a87e177f754c

    SHA1

    438a41d49d36f2cceb1aa1946fb94ce7870db826

    SHA256

    d308768fad1815de7e890dfeed739cb9da4317a3e98fd3155fdbd655d21f0dc0

    SHA512

    8c4ee8192e121d930273540e0f8fda7a2799262092b2b188109927c7f6672e15a8a4441fb08ae0fbc0c1c38f0b0779b2a15557e7f76dbc621049f49a6e12384c

  • /data/data/com.vucmlxwza.sjxhvhwrw/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    1c8d8c9381c2e67afae36139793a40e1

    SHA1

    924e9548f039d9a63e3f7850f95c9aabfcec110d

    SHA256

    096e6be70e4d5659be2a58ffb49226b072a6efd1d146138f7866f993f1acb2a6

    SHA512

    e2a7f920caa3cd6a7ea9d4faff973fb10077e8b4085e76c60469a80cfd89de56b4eb89025cc43ccd509f7b03fbeca29882cac957aecab4389ff5f3c46e3bfc13