Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    22-10-2024 22:14

General

  • Target

    d7ff2d1f705f725da56535f74f933a729bfbf4a1a8f6ea08445d104226da6417.apk

  • Size

    3.9MB

  • MD5

    787d3480125dac6d22f96069eaeb7b57

  • SHA1

    3bdc7a20ff9df09697292b83245b1f02ca7e0ef4

  • SHA256

    d7ff2d1f705f725da56535f74f933a729bfbf4a1a8f6ea08445d104226da6417

  • SHA512

    a8ad6b07f5ddc9f79dcbdf8d902581225ef464d8fcde57822a96933e6eaca327ebe078b5e447b797c90b701247c660f655d40c56fec437b656f296480871c79e

  • SSDEEP

    98304:+XhIdEKIVbcso6F95Ww8YBqtuv4CzLXV4IVwIlvOJ54gc1n:82dENVbcx4UFYctuQCHXV4IVrOv4Xh

Malware Config

Extracted

Family

hook

C2

http://154.216.20.101

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 19 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.ifqubepom.zmarotmgu
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4837

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.ifqubepom.zmarotmgu/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    3ae281248dbf98f3890c97f649cc55c7

    SHA1

    6ffd0ab57928ed90f3899bbfb2def9525e1cfc20

    SHA256

    b3f57b634456b807e9f938cd7e74656aa964c8e07ecea3907e185c3e33b01b54

    SHA512

    c26ebeea0b16042bd50403580e581a165338e8cd3d81e4611d25eaf44129347567c826168436a811246f55cb4933c5f9e812783c9a4aa5b09329469129ea8409

  • /data/data/com.ifqubepom.zmarotmgu/cache/classes.dex

    Filesize

    1.0MB

    MD5

    b2355901d064469a50743971aad86a86

    SHA1

    daf5151f21158f181eb8999ec119624a02476b28

    SHA256

    6b9d3bf8b6bb9667c74622bb3591a5f6ab7180d216bf6382d0eb2dc51f0b3d0d

    SHA512

    7b171c40de92a9ced9531c4a8566acced4850696e7453826f18a98d6c6995c9c28b308f061be675896fb20e67300c5ea29c0e76d3859c05a8f4f3af81a63fbf2

  • /data/data/com.ifqubepom.zmarotmgu/cache/classes.zip

    Filesize

    1.0MB

    MD5

    1822ed21be5654462a0b793a588ec4c0

    SHA1

    68d5b517efe4cb2675a5eaa8ecb83b1ff065c882

    SHA256

    57af3fd7cd3aad2ab2823563d08514f918b644f4a8a8f0a9cf7fdf94c5c6d653

    SHA512

    9080069b205466ba873df3ac0f1d766057b4709dc7e5c3a60d12cf34d437e83e3bf5a18f3d79e9db9e75d77bf0a44618da1685c30072fe52d0b4d343f8fa3bb1

  • /data/data/com.ifqubepom.zmarotmgu/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.ifqubepom.zmarotmgu/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    7412e3f099090724eb9b11026a7491a1

    SHA1

    415a8927f1746220fb840c4e3bcb51a47ce1367e

    SHA256

    6a5fe67be10e9253e265f1889c8a2df387c8b5aa122f11e00ad03834e7ad2833

    SHA512

    576fa5341fe89403259a559d98f08e6f6dd07a30cfe0cde88f26de34cf429abaffc6fe7df250537f77e347ce7ff7da45379a9c22b62092025ee52112e95cb838

  • /data/data/com.ifqubepom.zmarotmgu/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.ifqubepom.zmarotmgu/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    96b24bada3067d3085dddf4136fda08a

    SHA1

    9d4e6ac9620e3eae1521b5842782bdd41227fe3a

    SHA256

    75dd20dd7d61488904d825d475543dc59fc4400434b4c09449ad5788c669e0a8

    SHA512

    6ed522ba41fd3d8e5c2c099026b242b9a435f71d80a946b53365ee96ef830d26616ebdd10467601a0be599d1db00a760cd4fa7f8219b0a5ddc17646feb1727c2

  • /data/data/com.ifqubepom.zmarotmgu/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    87eaaae15bfca49a7499977352acd8c9

    SHA1

    e0466e0f2cf7de67cab9665e79dd16efc51cf865

    SHA256

    ac2d6a0681f1b60e3bb172804a137c00ac9560cd87708cd6131fdaf497d69a8f

    SHA512

    e1b9b1b051eb99f3f7538dc1ca97c54ecde509725b4b4a5770725b1597086413398aa21b4b835bf5617d5e4056295df5ff445ecf67fe0e338fcd278cc9534be3

  • /data/data/com.ifqubepom.zmarotmgu/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    2c43cdc5cc831f838a24ca81c6ceef18

    SHA1

    adfa8cb07675a9f1ecb510c5bd1db979584294cd

    SHA256

    25ce907ac3807f5a31b8d104a9bb452eba25d973de476d5df2d7f269bed9c1fd

    SHA512

    652cb04b2b5d25a9db3d2c16f47f2e8aec0d1ebff76b84bf7d95f50ff6ffcd6d88e8c77bb4d0943ddcb6d68d6bf2648d25bae07ac07d60b685bf7fbe7ce2ffb4