Analysis

  • max time kernel
    148s
  • max time network
    156s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    27-09-2024 22:02

General

  • Target

    e87e2fca13f288b9ce08480e6ceb927f70364a2066ce9f6d08402bde4636f5fa.apk

  • Size

    3.9MB

  • MD5

    cba268b555acb19e9985d6ef09d7205b

  • SHA1

    eb79c577cbb4674fabf77ff19d17cb9f5bffca0b

  • SHA256

    e87e2fca13f288b9ce08480e6ceb927f70364a2066ce9f6d08402bde4636f5fa

  • SHA512

    9ad3d29a14db2d4c148f368b27f0f5120513c68099ab251097ee434e8c9fcd931a9dd287767b79c22508547a9fe80abf571dafc0e4c1d19f22d5a2b83717077c

  • SSDEEP

    98304:jLo9ynM+lF+wlbUEaiHwxlw/oTi4UjLtlJP0Gzqfye:+yp6UbUFywIwTpUPJqfb

Malware Config

Extracted

Family

hook

C2

http://176.111.174.205

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.ewpuccwck.zdppniipv
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4332
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ewpuccwck.zdppniipv/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.ewpuccwck.zdppniipv/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4357

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.ewpuccwck.zdppniipv/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    86b9fe0db1835f343d939cee2952e690

    SHA1

    447040e88da5fc3ec446135081f069006a9742ff

    SHA256

    a74ccc427314378c54e5d9d7a9aa2049aae6e165117f92aba25ca783286c454b

    SHA512

    baf3ad8bef10ca284ceb81dec724a1de4dc6e45ed0a2f0ab721c2da3018d5ed446e55dee9b1d3bbcec02e8d5291e3b85870dbee29d993c9a1369a62e1830575e

  • /data/data/com.ewpuccwck.zdppniipv/cache/classes.dex

    Filesize

    1.0MB

    MD5

    ae15c3110dc89767b86a614c888bd49a

    SHA1

    f79259ed104268870bdd48f951a2745e70a3db2e

    SHA256

    04cd964ddb3c9d8cd1f08c60f285730e4e3555b12e0ab9fe8fcb1f6613d756d3

    SHA512

    147ec45e18dff89364c9f88fb430e4a3da64e186388bbd34b6bdd156e392e1b610d29b25b7b208c4be2be9a3fd483cd0e400ad5773d416329d9194ed9f67e405

  • /data/data/com.ewpuccwck.zdppniipv/cache/classes.zip

    Filesize

    1.0MB

    MD5

    0c5e232e6c87aeeeee9b2480908de8c5

    SHA1

    da9c0fbb1b4ae2d23f5b06ccea6f7efa90a9af16

    SHA256

    add0b3f98bf9382bcd7bf011b70c2dbb4432bc56105e4891b6c10ad073426466

    SHA512

    261cc0bf1b23803b4a04ce6024dafac25b09d9230c80f9f224487ad97aae269357fdb160cdfcfb9c234a0a0cdbb55c62b72a19df2747f6587233320a35bc5b2d

  • /data/data/com.ewpuccwck.zdppniipv/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.ewpuccwck.zdppniipv/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    c2a9b8178dffc335f644c5d4c40d312a

    SHA1

    3e5aa33af305a2cd46cad74430badf001f632c57

    SHA256

    fdcd1dbcbb6f7ae178bf8061e68adeb606d7f36a761662d54fc7b1e39796525b

    SHA512

    2443d6269078d13351cd265d911d55b7457b1a29f5d13727dfee9163057a03a23cebad165b2508e0b4c865f52edbcde88568c292fc2f94028d14d3a2295bbe59

  • /data/data/com.ewpuccwck.zdppniipv/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.ewpuccwck.zdppniipv/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    7505df204133f26745ee5e2cb324f426

    SHA1

    ec4aa763240d7f3c28866729ad085a12ff22fbcf

    SHA256

    c07799a891ba083952c7335fdc569c9e27af95f8f750debf426e26a312ea525b

    SHA512

    26a32a299ba9caf730d8d54ab5f9593331e7c7bb0aa82397ec976b879027fe340a258fdbb4501a7ac2d76498a5796f5fa1381713d487c9dbe540af2097de11ee

  • /data/data/com.ewpuccwck.zdppniipv/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    054884a578163248486f8772b93a4577

    SHA1

    464d9d735414188ebe2ea7e60a639cb93644ab64

    SHA256

    debca79d312ed80e8d1de7516e20d201577cf875c1bd824964ababfc63facf54

    SHA512

    47fee3b96fbc8a65ea2f51019f00ae5478a8753d88ec12dacb0c1035b1e672c0baff44af94a1dbe13f09fa01fa877554ae46200e06cf197c499000ca3c8a059c

  • /data/data/com.ewpuccwck.zdppniipv/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    0e8835b5b7face74246d079031c55bfc

    SHA1

    710672f7aac4a9a80abcca6b745e0121e92865a3

    SHA256

    6bcbe925704550b2c62a6d9034cd9f6a5860e45adf0139db18545cc17fbe8157

    SHA512

    b2e1c3bb46ae12fb6255e4215cc18a918af3bb43c86c744afd7ff667251f2e0b026ce86e077157b405b91a4a999ab063f8dcf16d8a179096b90bd4bcf6b44274

  • /data/user/0/com.ewpuccwck.zdppniipv/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    47bd45e8aa53fc25c1133e43abb77848

    SHA1

    b22b52573353f403e2c08aba35a7531ad452a5b3

    SHA256

    d7bfd63dcf5e0e16ec7465470e698b17077f81978960f72a2b9559ad06300de1

    SHA512

    7587a6b120a02a129dc8ef36a96c1d341814f83ee5aab39fc4abd98e72fd7474be76275357a2828ddbd82e69212523976eea5c04fb22730ee42875cbd4587588