Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    13-09-2024 22:08

General

  • Target

    4e08b0bf9d8f80edbd91da1b65e62ac7566c4602b31d5e1fc7c659e7647d29c7.apk

  • Size

    4.5MB

  • MD5

    c4ba4e0834ae3423c083b3c2b1567be5

  • SHA1

    90ec975973b0925d70862e72d7890cf76ba65584

  • SHA256

    4e08b0bf9d8f80edbd91da1b65e62ac7566c4602b31d5e1fc7c659e7647d29c7

  • SHA512

    13abe943ef3a983fa2faadba15e5fd955274ff8bfbd4eb1bd86303f171a4b21ba74bbfdd27253bebd3196fe587683135fd6f11abbf593b6ee28acf9148cb91d1

  • SSDEEP

    98304:Il+YtPzwd/hhc62oh8Eue5GFjfrMMPzc6GdhXXvzRNB5Xs:Il+YtP8hhcLRY4FjfrMMPw6AZvlBs

Malware Config

Extracted

Family

hook

C2

http://80.64.30.123

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 17 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.isethakvk.atexkdybx
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4623

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.isethakvk.atexkdybx/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    e2129fa6a62c50b32f58e2d8cdeaa2ae

    SHA1

    e0f7a927868a243069fa4e19e3e7d7b9a46350ce

    SHA256

    681cad66c3e2d3de7b4952be46510aa2dfef2c20feaa18514472074321bff399

    SHA512

    70753d60a95d4d4fe3ad5d1e37ead87c9f97a194abb72c6c02c27e3e0842969a1be18acae2e6601350fd16a61b549fbe2acbbf514f1a4b19ab7515117d4e6c18

  • /data/data/com.isethakvk.atexkdybx/cache/classes.dex

    Filesize

    1.0MB

    MD5

    e3cb1b8783660459b772d51dee05877c

    SHA1

    347a7121dd9167cf655a86643988fb87fd58f0d4

    SHA256

    c7e8ee170c86c5e93d5ee68845251efeb3da79a11b37bbcabe268e82ed351028

    SHA512

    86da101c331acb16bac742bf7824ef99005588e21f2e188483fbc2fd6916f68bd1062f020799a33d6eb096faba5ef7266bd47d97eeeaeefb8b0b1639567626b2

  • /data/data/com.isethakvk.atexkdybx/cache/classes.zip

    Filesize

    1.0MB

    MD5

    28d7a1a6f071eefcbb4aa636bcf61644

    SHA1

    ed241e8f2f5ddc142de555df4225290b18679800

    SHA256

    7a2ed56fe14ec45c3deff59754ed9e3b8d8cd6d41f1b717467ac9c55986c2f27

    SHA512

    25acf50495262827fab655f3d7e0e0e15ca632a639ad964874663559a6075f53be85bf833f4cf51e908ce97de8eee32c1156b652983519d4ddb5f66c6c533799

  • /data/data/com.isethakvk.atexkdybx/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.isethakvk.atexkdybx/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    14f8c4ea580d3be8c844fd9081c2f67c

    SHA1

    6c2367f6e81f5868db576e3ec7423270cfaf63f3

    SHA256

    768352c071c55e774819aabcf99859177c8ba4bdb3b7c01c55256adca9509dbe

    SHA512

    1e16cfa20fa53a418a07d3df0dde20094f2a4e9b93e53bd9c404d5342b3812cbd51635852d7c59668ebf57cd95621262bc935bde122dcd88d3398ae0b5b2fb7d

  • /data/data/com.isethakvk.atexkdybx/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.isethakvk.atexkdybx/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    de5e9e58b4151a29e68667feea4f2501

    SHA1

    59c1542f5ec2b13bf42f81645266d318ed3e68bc

    SHA256

    c52630887e6a7c4c7e0b4cdfe7df7b670205b16c19aaf08def114003538f885b

    SHA512

    2cce30a32e8c76e905e963c42a44223df0b03fac2c6841dd8e8c7c3785fef1c833d0a3d9088ec421a9aacb6f8dadcb1c1a0ccabb257a81d9ce99263cf6020334

  • /data/data/com.isethakvk.atexkdybx/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    a095a601417cb0346b6a718faf3c1248

    SHA1

    de10be630eaf3d6a3fc5a7b2eaadba1fc7b9c0b9

    SHA256

    017a09224a248aee27abce0a4ff894b87b66e681ad86864c7b8ab4b561c31a61

    SHA512

    925e069743bef15114ff3af9cc21e53ea39d15b1c27c4a6138ebbd248149e684c7ae95de716708859610ddd3929fda5f27c0b9e2ef46c9ad0afd5c533085825c

  • /data/data/com.isethakvk.atexkdybx/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    9f0951dcc4cb6bb2ff365569eeee24e2

    SHA1

    7005b6890377b522b618939631db591ac746f570

    SHA256

    7c72c991c48972526b8188deb985eed3de0d63f234648ab625c5bfc24c4e5901

    SHA512

    26e87c0b2861b22f740e1e21539b40ec2b790304c04802f355c521b2c352af6fa47635ebed8462e44e3293d25a6e16f4983873b665daccfd77876fd1e64cb89a