Analysis

  • max time kernel
    148s
  • max time network
    156s
  • platform
    android-10_x64
  • resource
    android-x64-20240910-en
  • resource tags

    arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system
  • submitted
    27-09-2024 22:02

General

  • Target

    e87e2fca13f288b9ce08480e6ceb927f70364a2066ce9f6d08402bde4636f5fa.apk

  • Size

    3.9MB

  • MD5

    cba268b555acb19e9985d6ef09d7205b

  • SHA1

    eb79c577cbb4674fabf77ff19d17cb9f5bffca0b

  • SHA256

    e87e2fca13f288b9ce08480e6ceb927f70364a2066ce9f6d08402bde4636f5fa

  • SHA512

    9ad3d29a14db2d4c148f368b27f0f5120513c68099ab251097ee434e8c9fcd931a9dd287767b79c22508547a9fe80abf571dafc0e4c1d19f22d5a2b83717077c

  • SSDEEP

    98304:jLo9ynM+lF+wlbUEaiHwxlw/oTi4UjLtlJP0Gzqfye:+yp6UbUFywIwTpUPJqfb

Malware Config

Extracted

Family

hook

C2

http://176.111.174.205

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.ewpuccwck.zdppniipv
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:5236

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.ewpuccwck.zdppniipv/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    86b9fe0db1835f343d939cee2952e690

    SHA1

    447040e88da5fc3ec446135081f069006a9742ff

    SHA256

    a74ccc427314378c54e5d9d7a9aa2049aae6e165117f92aba25ca783286c454b

    SHA512

    baf3ad8bef10ca284ceb81dec724a1de4dc6e45ed0a2f0ab721c2da3018d5ed446e55dee9b1d3bbcec02e8d5291e3b85870dbee29d993c9a1369a62e1830575e

  • /data/data/com.ewpuccwck.zdppniipv/cache/classes.dex

    Filesize

    1.0MB

    MD5

    ae15c3110dc89767b86a614c888bd49a

    SHA1

    f79259ed104268870bdd48f951a2745e70a3db2e

    SHA256

    04cd964ddb3c9d8cd1f08c60f285730e4e3555b12e0ab9fe8fcb1f6613d756d3

    SHA512

    147ec45e18dff89364c9f88fb430e4a3da64e186388bbd34b6bdd156e392e1b610d29b25b7b208c4be2be9a3fd483cd0e400ad5773d416329d9194ed9f67e405

  • /data/data/com.ewpuccwck.zdppniipv/cache/classes.zip

    Filesize

    1.0MB

    MD5

    0c5e232e6c87aeeeee9b2480908de8c5

    SHA1

    da9c0fbb1b4ae2d23f5b06ccea6f7efa90a9af16

    SHA256

    add0b3f98bf9382bcd7bf011b70c2dbb4432bc56105e4891b6c10ad073426466

    SHA512

    261cc0bf1b23803b4a04ce6024dafac25b09d9230c80f9f224487ad97aae269357fdb160cdfcfb9c234a0a0cdbb55c62b72a19df2747f6587233320a35bc5b2d

  • /data/data/com.ewpuccwck.zdppniipv/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.ewpuccwck.zdppniipv/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    99062efb62abeeae6c676b018371217f

    SHA1

    6cca412828fe4a04c708db6cc12eb3927ee21183

    SHA256

    bc64ce180695f0e6b230b783ce38692efc886858a892b4cad203aa82467ab686

    SHA512

    2163611304acecabb4523e838ab2564268d36bf4eeab0f949a5974a15640754195bd6848cf89d993a11273f547f55022d5d3229ee025f606157b3ef4cef2339f

  • /data/data/com.ewpuccwck.zdppniipv/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.ewpuccwck.zdppniipv/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    8eb656fbe0ced7ba784e87888935b6a8

    SHA1

    8a309b6cf98db34a3e9ad8d4d618f3a77f65c51b

    SHA256

    f4470530bc966e11ebb579c67455674b7c9af0d20d4763254930cf239e6a0592

    SHA512

    e55fac6feea88446e6ef3cac978c6e20ec4dba8f2db68a78aaaf5fd624c378592043afe028d2352f0fcf9c7541cbd487f1a56d6fe34e4b17e88bc20af726b47b

  • /data/data/com.ewpuccwck.zdppniipv/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    a9b2d8bd7de8e50a8336b3f976e5469c

    SHA1

    3d29092f4267ea7783bdba3847a7e1aa1a74dbe6

    SHA256

    81e14751ee6c1280ba41bbbf87388e153a04e7130969aca5ea5f79989788403b

    SHA512

    e32bb6b09faf5b9b9a14e4b8d40dc44c578dabc8a464065084ee87434aee032d3d3e6511066981dc61c3f8697cff3371cf67d2c7470b62d9afd27fff266bb9ba

  • /data/data/com.ewpuccwck.zdppniipv/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    cdb06039b3a1eb5d1d1a4bc58b1607f4

    SHA1

    450ae22e431441caf1fb05c203e0eae736656c45

    SHA256

    7e711aad516c640a4b3741d0193c6100fcdac5f9ba3b84ea8cd95341523a7e5c

    SHA512

    223b52df39e23933d79143c0113012ea56b2855d88be6df6ed91188a99ae426228b3696415569ed7d7bca71699fc37d5e8b7c57c144351983d2ef3ef03bdc8b2