Analysis

  • max time kernel
    148s
  • max time network
    160s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    22-10-2024 22:06

General

  • Target

    02ab9ed7120ffc1ae040ec2fe9d847b569d2d05b60e2b830c80632e1aa990bcf.apk

  • Size

    4.1MB

  • MD5

    6b5b160f35e216c74c39bae4f34da3a1

  • SHA1

    b0ea76c9812bba195faa9f637549811c532dd3d4

  • SHA256

    02ab9ed7120ffc1ae040ec2fe9d847b569d2d05b60e2b830c80632e1aa990bcf

  • SHA512

    d6a0fb306da757be2ce32a6a9167af87523898aa9e2d55ae9626637d732b7e7399a72df37ff1c0cf8356eafeb8a0f91ee1972cc64ed90832a61483bd56772b76

  • SSDEEP

    49152:lqNOrgtJpiaCfqjUxYQ2r/WAtsG/nua5iAoqIlMqxjic9Z95G2a4K+AgGi5gVwhh:lqNfh2qjUh2r/1nsjqInjf5LViygVDGX

Malware Config

Extracted

Family

hook

C2

http://193.143.1.24

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 18 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.hptzvyhwf.ryacheruu
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4808

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.hptzvyhwf.ryacheruu/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    3babe20b4777345cb32d4eecc815b8dc

    SHA1

    6e8c071b59cfc6d5459255b17e17ccf4d017a094

    SHA256

    5400a29cc8cde255da7d91b26ae87f22cbdd13f361b7e6ce1c3431f91e3ade04

    SHA512

    360108ce98d60a9d1142acd669bf3e8c87c96af0a7cf845c6fe58ed738b1e0cab497530c611dd7ee247ee29c1fbff57adef02367e8d2ad93396d0d911e050aff

  • /data/data/com.hptzvyhwf.ryacheruu/cache/classes.dex

    Filesize

    1.0MB

    MD5

    917ad44d4958aa2142e5d3103ada5744

    SHA1

    540ac218739e6b8565ab714fd716f5a032089354

    SHA256

    798f125e7b854449c8147cca93cf1f810a02c835ec075d098f0ca93aff93310f

    SHA512

    b2fde4997ed8308833eb79d5ff5ac2b641dc9e50988a03bca04bbd7b54f45d17212cc4a3795862b019ca1821b7e78c38f0b1b49190c6d4196b8fdd041520070c

  • /data/data/com.hptzvyhwf.ryacheruu/cache/classes.zip

    Filesize

    1.0MB

    MD5

    be3c515468abeb7574d8e513dee090b2

    SHA1

    1b971919e3f73f78fe21822caf0100fd6528dec8

    SHA256

    fe9b005ef34c9c172fd7c2f4f36404b8a2f768ed14d7aac5625acb2132705e83

    SHA512

    64e1156a7fa34042f0936ce74ba9f804fb03a8d269cbea9c68f75c61f3556f21a4b3f685369eb3c1b8b50bd36336064645ecb86cc38d78471311c2414fc9df7e

  • /data/data/com.hptzvyhwf.ryacheruu/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.hptzvyhwf.ryacheruu/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    e57ab85222cff7689d282a24a30299db

    SHA1

    560094a514a4cab2199a138acd29af9a0934228c

    SHA256

    1a99c65dad4654fb24598989d2c2183a1591448268d187e5d854940dd4593270

    SHA512

    bcbdf359fad723fb69b10b61aad59b65fc4f458deaca17a53a77208ef97e27384014d8095c1468f85353559e76ebd2d9922fd67bed659ec07356f6a4308e1cb9

  • /data/data/com.hptzvyhwf.ryacheruu/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.hptzvyhwf.ryacheruu/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    9490da0578983bf98d3cd94d9b6a2e6d

    SHA1

    7d3fe1e5420741559863cc3261b91ac54c7baf26

    SHA256

    996e2355dced3203ba2ce168bfed62954c43a567ad6a01dfa6746d233bccaf8e

    SHA512

    63a8b676bd14126b4ef90822e556ec6675a79c05dc1762b918908916f7d6b7a6259dd5e9bfec979549fc1bd2dc3190b17b882a569377b7dd82e98e69b6789107

  • /data/data/com.hptzvyhwf.ryacheruu/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    917045fad8e927ea0037679d841a9c05

    SHA1

    e2010ea1de936a470cda77ed349e395921ad6c1a

    SHA256

    517c574e2065ff372e1734f55ce828539ecc1de1f9f2b97fdc1d10de9cefc5c0

    SHA512

    66b095a2a8c1a232863aff0ae43652dc06955c0233c8b9a0c6b6eb7f9c19538f1e05f5dfa5b234da99b70c90523e172583d932459d277b4962d70814a28be5fd

  • /data/data/com.hptzvyhwf.ryacheruu/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    6167bb2b5fa6341b4f2e140de3a151c1

    SHA1

    368ebe6de36f4af66b33dd5fbce125ca5dcf3f82

    SHA256

    d7ae40c2ca61b62fc3141cfcdf930a822b85c052be635b5f87834cd58bc9885e

    SHA512

    13a9d1b1fc0923260db21d983ae084eab8afe0fe180b90ee9100df4661352269a37ad0e4739f325c5202ae23a538b261b6d47d7aa0a661edbe4139227c0476ee