Analysis

  • max time kernel
    145s
  • max time network
    157s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    22-10-2024 22:14

General

  • Target

    b44fc23a7b2d47f1d37c2fef35379c4c24b5c48206cacc972dc5fa214002957e.apk

  • Size

    4.1MB

  • MD5

    85857d8ae8932800b3da83816d795059

  • SHA1

    57137ba2dac1a9d8c491a5eaa726df34c92775fe

  • SHA256

    b44fc23a7b2d47f1d37c2fef35379c4c24b5c48206cacc972dc5fa214002957e

  • SHA512

    09769579b65ca4c8d796094c43701c6b5df6c8f59904cd82fb3982d208c09530df7e521b10e9674b552e90455d84e503916328f7ce3c2f238ca1183934f9729d

  • SSDEEP

    98304:78ypH0dxn1S7u8JjAfPB445G6IcmCVMrw5zE6LS:NGD4KYAfJ537Iw5zE6LS

Malware Config

Extracted

Family

hook

C2

http://193.143.1.24

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.awmcwyocg.rzpkjvsdp
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4242
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.awmcwyocg.rzpkjvsdp/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.awmcwyocg.rzpkjvsdp/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4268

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.awmcwyocg.rzpkjvsdp/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    00482e04ac723b30d33f0748f2a9e6b7

    SHA1

    90452b6abe7b3562816410890ee360c4eca9e7eb

    SHA256

    7ec54a20067b754a630c994f33c5ad56003c4aed76ffda8f3a4d05ac9fed1dac

    SHA512

    b70fe04cf5c9ac1f1d2e4021d278dfc1cc83bfe8fab624d60c616c776ed7c3cf9edac3c433426af4a2cc0d7978277c5866a5c309474bb95f7638a4ca55351c26

  • /data/data/com.awmcwyocg.rzpkjvsdp/cache/classes.dex

    Filesize

    1.0MB

    MD5

    de9013a54e9fd2dc5259b83813387e9a

    SHA1

    2cea53ae603e673b37823f085e999d7cccb0240a

    SHA256

    e5cf2adb538d40425115c3a5c085c954447c10b27617cbb31450444af2543e51

    SHA512

    bbbeb19f639fb3ceeee16d49bfd59c39a7b5ca0918a9478805d11e3edb8d8789ff60abaab3b440a808601b84f9f7070a5b87349d303af67cf7017fce9f26fa2e

  • /data/data/com.awmcwyocg.rzpkjvsdp/cache/classes.zip

    Filesize

    1.0MB

    MD5

    a2d3ecdd59f301e0f8dec362fcead78c

    SHA1

    58f56a331dbb8ba0296e06736775aeaa6c284a2d

    SHA256

    3b794ac24cfae52e256bf5615c530ffd0ba444e5aaf414ffe60a476db8f59002

    SHA512

    638272309f4c2ffd1cbffaec081eef3a8a1760209681c8fbeaa7eb6d96cc421123d8e932b54ca5d3e48111a8e74b0ef8060d8d04affcd6a9a9b544ae6919629d

  • /data/data/com.awmcwyocg.rzpkjvsdp/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.awmcwyocg.rzpkjvsdp/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    5e3d5dd3721bb3c6463938e1140d4839

    SHA1

    e9243efa60da7292341474ea7ee5985968c3c333

    SHA256

    ae2f9131b5c79ff2cfbdf167fb995a8de6dcf4782537aed6f4529848f23b564a

    SHA512

    4c54fc7b3bcad152c6ce8509dcf7b8cb3e811a9bb8954f3c34c645350805ef41ab076478e8aea0eedc4408a1e24b3b39daf907a7329e1f0ff77f7982d3701134

  • /data/data/com.awmcwyocg.rzpkjvsdp/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.awmcwyocg.rzpkjvsdp/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    addd7a3e418389950ea86ccfa195f0fc

    SHA1

    4c988a4d1fa221846d943ac6e0ea044f3ee5ae15

    SHA256

    7d9b76bdeab69b33e01b0aeb865fce6fd7122a11dd79864f081200b341abaf69

    SHA512

    13b87eff9d2754df07d8def1c161499a88d89bcb2dc1f6ca50aaae63b1e57ca5aeb0e63aff14553cde02f263544921a977d2fe9bc0b1a4dbda639f3e87ad9773

  • /data/data/com.awmcwyocg.rzpkjvsdp/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    54f015723374f7a017fa3317dc60b461

    SHA1

    e9720d153b74bae5df88944e83a4da49f78db874

    SHA256

    65f0f2853034e709ac71638e01c0bf03acfeb8bd171ec2b3698e5b76def742d7

    SHA512

    5fa1966c45104c619014742670282cf90b170143fcbdeba241c2688c11aef90271cb998100c6a4b08c1d08943bf6a2117dcc52008ea7193d2fc796316a0aef86

  • /data/data/com.awmcwyocg.rzpkjvsdp/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    6cfa2db5f96c5a56968ef0b91bbf90a3

    SHA1

    91c8b523cbd3e16b22cf4d0a88fe19e5028ad5d9

    SHA256

    f584766fb31dba369cc135ad13e0df9298f0515e495c16a659c392ac5165827c

    SHA512

    baf9ea3ec0741314df0e1719d2bb97724c19c4d351ed3a028e686d4e9db5b82e30f9bbc267513201656aabeff9a80844c8410f04fed62c6d50b5dd9f9722c1b0

  • /data/user/0/com.awmcwyocg.rzpkjvsdp/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    da627641a6468c9e32b7dcf442cbab3b

    SHA1

    49168d7c785956896f9ec99125d3fc2859849f05

    SHA256

    a1699ad462342e0cb02ea1b5eb5a63b040329e2f8a3fabe8874fff30b1b4b5a7

    SHA512

    01f70bbb31854151bfaeff604698475ccedd392d0bfda6141d307e87f463e4c244d73e424b296b518a90e26400d3d93bcd2ccdebae940513088d3ef7803069ef