Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    22-10-2024 22:14

General

  • Target

    699d589e1470d40cc02a1880dab4a4cac24f681096b200d4871fe3c6807337ce.apk

  • Size

    3.8MB

  • MD5

    a8ac839b76d0fbae5c83fedc18a0fc46

  • SHA1

    75ab8369c36851f6bbb15e47581d96d9192e2488

  • SHA256

    699d589e1470d40cc02a1880dab4a4cac24f681096b200d4871fe3c6807337ce

  • SHA512

    0b62f778ad02a92fc9007ef1552432ebdd2510f99eb4852d1e31c69c29877a3fc943f1918b0338fe03df609f91dd9c3569ae21b787d6034c28f62ea618983606

  • SSDEEP

    98304:0V+Spd1dyQhQEsnumInt8oHHgYMbIXbnsVHrFe7:/SpdSQh+/cDiijaw7

Malware Config

Extracted

Family

hook

C2

http://negroti5k3fa.info

http://aprilka21jfa.live

http://mishao11jfac.pro

http://vamir99ffkkd.info

http://prebadejf41vv.live

http://hopfvba01fv2.pro

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.fswdooiiy.cmmlmkjde
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4322
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.fswdooiiy.cmmlmkjde/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.fswdooiiy.cmmlmkjde/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4347

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.fswdooiiy.cmmlmkjde/app_dex/classes.dex

    Filesize

    2.1MB

    MD5

    bfec9b0c3f2bba39d0084e56786f7578

    SHA1

    1caa527bab6520858df835250f0793285828ef06

    SHA256

    c3937c8231f0fc95c1650753d9d4bbda0cdb117bbd5ed76d70b029d06efa7542

    SHA512

    156e9c71a4540a722cefd65bcef0aa4a94071addad650e6dfca5cca8147eba79d59178263f7f3a9f27865fd53b7949b04a8c7ac7a556d53478753a942f642aec

  • /data/data/com.fswdooiiy.cmmlmkjde/cache/classes.dex

    Filesize

    1001KB

    MD5

    f09b81a97759ae30633f34306a74e70b

    SHA1

    41750c4a083633234414b618df68f4dd9812993f

    SHA256

    01cbb7e5194b3e759cd4e12905f53e02d9f069cae83225877fa008d4ad9a42bf

    SHA512

    676b5be3a34ff76c538ee9427aa1ad77520fb90956b61e6f07f6b753aaa583bfdae1afe942b5569e07ed37ff2ba33f0c368fae3a7d38926a97e15a4af8cb1df4

  • /data/data/com.fswdooiiy.cmmlmkjde/cache/classes.zip

    Filesize

    1001KB

    MD5

    ab4ff79224a3356923bdf52a28b9366c

    SHA1

    72992ef16e44f4949c685e5ca6bd645d152d6da0

    SHA256

    38c4affa1998922818f3500b772c5a6f9c1b0966745ab90da036507a32fd8399

    SHA512

    1ebc21bd8f814e720700dc16ba4a9070a6506bf1fd74d854da8006d465611e4034bb3a1b38204fcea34fd8c1151505f6af09cc0a54fca91c274a6e54cfabd605

  • /data/data/com.fswdooiiy.cmmlmkjde/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.fswdooiiy.cmmlmkjde/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    d5eeb8110047697f5afc42056dcad9d9

    SHA1

    64ddda8178879ffef05275391a639281b518290b

    SHA256

    13a773957d48955054aaff8afce85fafd035bedd1f4abb597f0e941e5cca3f7c

    SHA512

    65da00eb45416b4e4678f33bc3e2c2e032bf548fe83f2e746ab81cf8698e8c679303de6b6762b6d3f711bd518a6b2a054a6c5d9d9e23537a328a787fff4c14f5

  • /data/data/com.fswdooiiy.cmmlmkjde/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.fswdooiiy.cmmlmkjde/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    bc8fac3ca60b5fdd448c6ffeb6c3d77e

    SHA1

    b9296ae5b494b25b7b387deb407aa079171a7c3f

    SHA256

    ad8569cbb88b1a572987f79b87c204c3fed6c98d8aea446569fcd05d9de8c9c1

    SHA512

    3075cffc5a9b23222ceccf7fe707a91569a6c5607c6486cef0b1ddb083eab34ea1204f58eac0d16a40a4ca13b50cd965f9598568f94061a888624f597a6d0269

  • /data/data/com.fswdooiiy.cmmlmkjde/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    18ebb985c57f3ff6cb1eb36157c2e5d8

    SHA1

    273b7f25f6916191cbc1e9dcc3c6a96dee3dd68f

    SHA256

    fbcbab75ab21de8848cf828020126c9baea8324dab86e87ccc988a42489e2cfb

    SHA512

    ba210b5cb9890170ce4cc2a17961a2e180bb1a52a5f065be60c7ad16d618013c30c490b537261be8d3db50241783a2d263a37acfeb282c8a454050b14357cbce

  • /data/data/com.fswdooiiy.cmmlmkjde/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    d8b80bf387808a2e42509f1d18e24e32

    SHA1

    b01864bb071b73867df2eb4238d69fb861d67670

    SHA256

    201e89fc1585a439f5f96f4fd3278d01e2718632e7a7be5cb89e692e5e19fc22

    SHA512

    bb94beca122f0b9ac7ee27eca6b89471bff5faef814447e3ad5ea78adfd20c2ec975364faab8145fdcf7feda85546f23b93da62e8a4cb45a8f8a4abf3cb86b4d

  • /data/user/0/com.fswdooiiy.cmmlmkjde/app_dex/classes.dex

    Filesize

    2.1MB

    MD5

    5a243cef26d8f2c7be5d1e959abde591

    SHA1

    e612591f90b7481801f4cdd049e163bec076ffa0

    SHA256

    5b829129a4054e59de2b5314956c799d3c6393941231155670db8d1be5512841

    SHA512

    5233421a61706a545ce0d70a702d7c869aacb1ea0eda15a895ae102c160fa9233fa9319242ed2d0f7e28a7f1dbc3cb9464671a29fe1f808102c3fee88c02739a