Analysis

  • max time kernel
    149s
  • max time network
    161s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    11-09-2024 22:00

General

  • Target

    da68f3761855cb416561719126b46cddb738dd36930d9005073b554bfbe88188.apk

  • Size

    4.5MB

  • MD5

    b978be7c10cc9ad633297b325d0e5f8e

  • SHA1

    b62ad6474e0c491b3bbfe7aa425e2f3963405fc3

  • SHA256

    da68f3761855cb416561719126b46cddb738dd36930d9005073b554bfbe88188

  • SHA512

    82c9f0ad84dfa476a26fbd8f05d7703d7e10183d221c54da49c187996be1d91984546122f39ed32f50694edf33ca43eaf6117cba38940a1eed0d59a3e708c5c3

  • SSDEEP

    98304:ITTdJbspOYwzTkg1jm6CwKEVQ66hZoIQnKIetNmZDx25q5yE0AoR4Y:K3sh05sFEVQTLI2mRxj5yE0mY

Malware Config

Extracted

Family

hook

C2

http://185.147.124.43

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 9 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.mfuhhbhyd.anrsgvsge
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4253
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.mfuhhbhyd.anrsgvsge/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.mfuhhbhyd.anrsgvsge/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4284

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.mfuhhbhyd.anrsgvsge/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    6ee308869afd47ed550b4404db020f0d

    SHA1

    f0fc3b841ceb0bfaa3fac9df8f48dbb94030ea70

    SHA256

    5af756df5b912b317f459b4f632708e89534468747d8ed9a9c18e944e762d0ba

    SHA512

    94444f49771a610150ab1c51accf2db9aba1a0b42d541015f67e9193a76e1ffb274801876b86f7e769f55753ab9a341ce56456ec2a4e09d7df5a9fceb8499c3f

  • /data/data/com.mfuhhbhyd.anrsgvsge/cache/classes.dex

    Filesize

    1.0MB

    MD5

    4dd1a2fc4702ccf385ebffcb398262aa

    SHA1

    e88ffcb75c28e17f6cf2d5f765e94c0741c571eb

    SHA256

    2d842dc62a5a7443a54bd44848735759dc3f95919679db94254c7a38b4a02f66

    SHA512

    a7c404519584b8f0b981b7dac3b7ec8e7ab400f7fa5347dbdf52033147d18b06aaf9998d215b3b05870511d68e65e3b2aff965bb3b3de260651e2cf571e1f8d5

  • /data/data/com.mfuhhbhyd.anrsgvsge/cache/classes.zip

    Filesize

    1.0MB

    MD5

    4643fce6e599187bdc1fb8635b012fe9

    SHA1

    73b144794508156467477ad2ca3b858982c18482

    SHA256

    170d44b56f9171ea4ab0b3e3f64d7e0d862e90ef76ca8229c2cd512a07638ef4

    SHA512

    fa79bfcc50f1ddd9e39d18f56ebb1f9984c0c26661f8724c5b465d45efa70c43f7067f1e568788ba7071bb6a7e373493cf342f77856b5961df4524f8a29cbb01

  • /data/data/com.mfuhhbhyd.anrsgvsge/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.mfuhhbhyd.anrsgvsge/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    2eb5aa450460f4a0d55ec462832fc5ef

    SHA1

    4b85ec32ff148d82a35a41c4fbe58042884fea8b

    SHA256

    123b3c01495e12fb5a76cb7a9d4d653227a064d915f02bbb097d1e9199b514b0

    SHA512

    c0c04b9b3b4479aa4090dd4eb152fff88c35266c5726a431d95794ebb3458c166127f2a1617f77e7fd7a7506467fdde53db4ea4b7e1b3c8c20b42ddbe6cffb52

  • /data/data/com.mfuhhbhyd.anrsgvsge/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.mfuhhbhyd.anrsgvsge/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    5400a144afa4ff902bf93bb891c66434

    SHA1

    c89301d52f5969c54966a4849839ca1d3237e1ac

    SHA256

    daa90c75534068a1284131bf111e2355fb17f1f62f13e4b53f56827f62ca7f80

    SHA512

    c21931585b5911f948352264bcf909b2c0dc6f57bc2bf5b2dd6122cf60e5bd86450350be6719970f2f3304af8bf1dfc5266726e63e24ca689bf5c9bddcef8df2

  • /data/data/com.mfuhhbhyd.anrsgvsge/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    842bf0773c50e8eac3c6edcd7e02c8e2

    SHA1

    5f44d1d703c421f5e63e6dc0a8729ded4f4584c9

    SHA256

    d37dd18b425b92d4b2f86fdafa152f5bf08f6a18c27ff80e7c51500f3432ca80

    SHA512

    29d89f93e65647a0cb84c76f92b66795a0e6e602414e3f5746bd5acfeb9d43c8e0439dbb8a6ebc7241a05a6ac9c9e8ea40652cab68f7ef4f6a2d99aa4c1a27fe

  • /data/data/com.mfuhhbhyd.anrsgvsge/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    86d6c816fb27d95263fd06e5b620662d

    SHA1

    1b8823c081915593ea3235b67c91337988ff04cb

    SHA256

    10fd372f35af84829168ec70c2d1c90e64db0c389a31bc4496572facb6e31715

    SHA512

    9089c753f5d23ba6db6c9012d5b062bb4875b6827c0fbc23f7c37a879335c9abe72099ecd41a755c9a709d6023e15bd563ecf1dad6c76bcce8e5bf7b45a31a38

  • /data/user/0/com.mfuhhbhyd.anrsgvsge/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    26fe4d43ea8a9df6edcca088c8a88456

    SHA1

    ca2bbb0876cbe3e637a0a465b94259cb5c74f811

    SHA256

    130d9c5942cc9909f2d29773e329a843b386e39c6bf496ebaa57e09f3de7e7a2

    SHA512

    6f954b9c6e097b70daefe659ff0f1d961a70c17e50eaf8c42c9de5053162eb1b177f2220baeb9ce2317ac86658c9e0e206139755a97c82bc2784936b1e2887b1