Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    11-09-2024 22:08

General

  • Target

    e30552f81269ad6116454b448a84902aa3455ef26fe4134d158c88237ccab14c.apk

  • Size

    4.3MB

  • MD5

    760ed7289d1653034906cf36b7f8f86b

  • SHA1

    e7ee0071eb34934711a54293cad29d7ac6402750

  • SHA256

    e30552f81269ad6116454b448a84902aa3455ef26fe4134d158c88237ccab14c

  • SHA512

    17e76dff6e5357d5c5064123c21a39e97e8cd6db1a26a779e6587b58954bf8bb41f4b3879a223f03a09aa66f1669072efdde31c01305c8c670cc4f100cf2988e

  • SSDEEP

    98304:s2BzO3dfjsT+ZAhUrRCXHVbzr+XuLd7nbYvcc47VtU/2/:/O3dfomAarsXHRzSXuL+vYVtL/

Malware Config

Extracted

Family

hook

C2

http://xds3njsqop.xyz

http://mnj4poxsrd.live

http://swxmj5io.pro

http://ioxsmjr6r.xyz

http://xr7mkokwsq.xyz

http://mbnj8uyjg.live

http://ewr2ionmxz.xyz

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.vucmlxwza.sjxhvhwrw
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4814

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.vucmlxwza.sjxhvhwrw/app_dex/classes.dex

    Filesize

    2.0MB

    MD5

    b654dccda70e93f25c2a79aa3a7daa51

    SHA1

    146935cea6addb94bd72d8d52cb11cacd67d4c69

    SHA256

    ca9046a9e27ea7bd25e2db488076a44aa060b165fda0df248fb8c308fed0588f

    SHA512

    ce41e6b27a9fbf7c890b211dd1fe1dd0835714b0b5605469b8d2e53ff0a910210653071ed347b811e4afa3ba1b18a1ea0cbd9a7c9680a84f0e3227ac156a9691

  • /data/data/com.vucmlxwza.sjxhvhwrw/cache/classes.dex

    Filesize

    984KB

    MD5

    e0a92432b94748111aadc99199dd3d2c

    SHA1

    2c9fef7a837850783e3e9b69127c9a596c05c544

    SHA256

    97e2bc2ab28c58dc19aea09abf2c6b41c6e611008090fe2b4f47588a458365f5

    SHA512

    d0ee15007b325b7911b5fc7fb841e8908c8d5f8fdb44c956ca0fffe6292faebde3c3f0b89e33612e59ffb6c46cb0d7bf4d66858f1777ec5b98b5f992b5019231

  • /data/data/com.vucmlxwza.sjxhvhwrw/cache/classes.zip

    Filesize

    984KB

    MD5

    2be50b9e28cbe47c8fd8091ca82ffe2b

    SHA1

    09559db3b2550bf80de30f322af7a0e67d80f6f6

    SHA256

    7b018bc58c54200c706e725ba5f1631e67310acd09b614d90ef4beb30555b377

    SHA512

    8e5ed6cb54cd91a8c41e514e48250d8a2313e1dbdc4a618c96dd14e6ccee86cb85c9595c52556c602f8ae48fa681823b8e63e916a0642af601455aef31aa20e9

  • /data/data/com.vucmlxwza.sjxhvhwrw/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.vucmlxwza.sjxhvhwrw/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    02c4334885297ec05cd51e2293aa6c57

    SHA1

    6291c7a90e1a4d6e7e217968343e1f88994a249f

    SHA256

    c4d5b65a71076e44ca0836256e04f5b27a0f61097caaadf0baeeacccba0d944b

    SHA512

    5aec5b57eb44f03c658850822797f4549476a38a4493f51f840d81de03ffa3334e04a4e4db5004eeb937a238c97b13a7c75cf58391ba03f3f36fb71dcb84c9ca

  • /data/data/com.vucmlxwza.sjxhvhwrw/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.vucmlxwza.sjxhvhwrw/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    25977e7306d4847045d0b1543cf02489

    SHA1

    9578e500d514ad92af9a7a96a0b4c4d5cba9d6d8

    SHA256

    79f73c064b84757fd49aae43b19bccfe5ac360f8eecfad66f918d3bcfe13c2b7

    SHA512

    4e06351eb0e4fee738e9c267b861cb9138572bec23872185c7d51d1e62cfad3367a499f952849aea69c51715b9a4d75f82d486105a70006a3454f66ff7966092

  • /data/data/com.vucmlxwza.sjxhvhwrw/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    4e8c647d95f109f50647ded551d9126f

    SHA1

    ef0e3e502a680acdc5cca89f4d5a1f3d7866f2e7

    SHA256

    bfe43c179e4a60815024272396ec1c8afecad06ed479da8c4fb449780060b180

    SHA512

    9d8238a4d37e31728735036bd5caccd30b2b738dacd0b75fa2b0c9675a13fa1bf26f9df948645a68a64aebd0842b9e301bcf2961d2929c20ee733dff9168d023

  • /data/data/com.vucmlxwza.sjxhvhwrw/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    748675030862fd454d69bf0ec1df6339

    SHA1

    d09a9b096ffa5c2d6ed660f44e58ebafd2224598

    SHA256

    27c69ec5522ea034e63c5ff9b0b6f8cf533cef4354fb2f0634a0059c9323195b

    SHA512

    832f6c2b699a4aec88f4823e868f604d196d6559e96bf81d31ad5767a91451dde817d9438f2090881d4bc60560cb487339610f476db0c4d3354f0baae943828c