Analysis

  • max time kernel
    37s
  • max time network
    159s
  • platform
    android-10_x64
  • resource
    android-x64-20240910-en
  • resource tags

    arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system
  • submitted
    22-10-2024 22:06

General

  • Target

    02ab9ed7120ffc1ae040ec2fe9d847b569d2d05b60e2b830c80632e1aa990bcf.apk

  • Size

    4.1MB

  • MD5

    6b5b160f35e216c74c39bae4f34da3a1

  • SHA1

    b0ea76c9812bba195faa9f637549811c532dd3d4

  • SHA256

    02ab9ed7120ffc1ae040ec2fe9d847b569d2d05b60e2b830c80632e1aa990bcf

  • SHA512

    d6a0fb306da757be2ce32a6a9167af87523898aa9e2d55ae9626637d732b7e7399a72df37ff1c0cf8356eafeb8a0f91ee1972cc64ed90832a61483bd56772b76

  • SSDEEP

    49152:lqNOrgtJpiaCfqjUxYQ2r/WAtsG/nua5iAoqIlMqxjic9Z95G2a4K+AgGi5gVwhh:lqNfh2qjUh2r/1nsjqInjf5LViygVDGX

Malware Config

Extracted

Family

hook

C2

http://193.143.1.24

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.hptzvyhwf.ryacheruu
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:5111

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.hptzvyhwf.ryacheruu/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    3babe20b4777345cb32d4eecc815b8dc

    SHA1

    6e8c071b59cfc6d5459255b17e17ccf4d017a094

    SHA256

    5400a29cc8cde255da7d91b26ae87f22cbdd13f361b7e6ce1c3431f91e3ade04

    SHA512

    360108ce98d60a9d1142acd669bf3e8c87c96af0a7cf845c6fe58ed738b1e0cab497530c611dd7ee247ee29c1fbff57adef02367e8d2ad93396d0d911e050aff

  • /data/data/com.hptzvyhwf.ryacheruu/cache/classes.dex

    Filesize

    1.0MB

    MD5

    917ad44d4958aa2142e5d3103ada5744

    SHA1

    540ac218739e6b8565ab714fd716f5a032089354

    SHA256

    798f125e7b854449c8147cca93cf1f810a02c835ec075d098f0ca93aff93310f

    SHA512

    b2fde4997ed8308833eb79d5ff5ac2b641dc9e50988a03bca04bbd7b54f45d17212cc4a3795862b019ca1821b7e78c38f0b1b49190c6d4196b8fdd041520070c

  • /data/data/com.hptzvyhwf.ryacheruu/cache/classes.zip

    Filesize

    1.0MB

    MD5

    be3c515468abeb7574d8e513dee090b2

    SHA1

    1b971919e3f73f78fe21822caf0100fd6528dec8

    SHA256

    fe9b005ef34c9c172fd7c2f4f36404b8a2f768ed14d7aac5625acb2132705e83

    SHA512

    64e1156a7fa34042f0936ce74ba9f804fb03a8d269cbea9c68f75c61f3556f21a4b3f685369eb3c1b8b50bd36336064645ecb86cc38d78471311c2414fc9df7e

  • /data/data/com.hptzvyhwf.ryacheruu/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.hptzvyhwf.ryacheruu/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    1bff8393321e326dc03acff9b00e5f21

    SHA1

    fe94ff1af9ff61757e16be12d55d094b8aa60940

    SHA256

    d9bd7f00db5ec993ae5d940893acc76baa0d52ed027f71ed7cca6d3021b50aa5

    SHA512

    c321b78ee831b5ecb3674118dc0003118f4937e2f444e94753ef887e47ee0c63871f4abd4f513ff289565d2926a1e57dd180539c9bf8fc948a73a777a0e085f5

  • /data/data/com.hptzvyhwf.ryacheruu/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.hptzvyhwf.ryacheruu/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    9a9dfe596cdd4fa064a892da0660b47c

    SHA1

    681dd53d7ffd0dd9535b50b7151b6adcf612199c

    SHA256

    863ebea65a01ff4177e82c38941efa1c2960892df080b41a9a31024fda0f4069

    SHA512

    7a09fe95e7e56f82ca79327df3f5c61ff3498f17c35fece808244b883a2c4be0aeb0ff48bcf3f9981f28db1a1217f58d17eaf3963b035d6c1a1383d859f09236

  • /data/data/com.hptzvyhwf.ryacheruu/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    10f938d234b066b41cb2ec385308d209

    SHA1

    40be5886de38f9a8b19c46b87a8c1f999cd3cedc

    SHA256

    1283e354b7161b0b255fadaadb01804d9d8d07d3be1c4131471d0e02d7f13839

    SHA512

    01a918796858ac5d740df0fdc3a5e7d187655f222ccae70bbf4b89a19dffcc9b899a869de8935d8ef580740be7187daf686633d1fe00e29cb932598877ae4cb1

  • /data/data/com.hptzvyhwf.ryacheruu/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    720240d2756dd475ae73c0516b3f0da9

    SHA1

    9fafa45fb59cf68be57d127112be58839f4bc884

    SHA256

    4abf5d23308392480b57da4d2f718725d71db26b2535c18f156f443ee7d30272

    SHA512

    cd4068b391d248b46fd3349d59a22a0c2a1176ae5256c6b372e64ce2d7c75432a0cf9f18404e778ab8b880e862ca5c3fc54ad63967986d64def3fd9a10839944