Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    29-10-2024 22:09

General

  • Target

    8525e732c00a2d03ffcd3202958ebc6ed5b377391c891f0f5aa520c8121bd130.apk

  • Size

    4.0MB

  • MD5

    da124020a3f0aa07cc90f999ac5f0d5e

  • SHA1

    40fa5e0e4d21bc97c04528814ed4013c3cabc1d4

  • SHA256

    8525e732c00a2d03ffcd3202958ebc6ed5b377391c891f0f5aa520c8121bd130

  • SHA512

    866fc0a58fbb63caeed1affce3b770615140d5b6ec2d36cd7ac9a9abd93932401845bf183988a00a7d08c48ba87cbceafbc294769caed635b46f2f27af71f060

  • SSDEEP

    98304:aVoHhRpG7lPdTx+BJC3499PHAgvqYhwD+uyVum5jBH9su8:/5M1TIXC3UHDVhwiuyl5zsR

Malware Config

Extracted

Family

hook

C2

http://193.143.1.24

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.edlazgkha.irnyoqidw
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4260
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.edlazgkha.irnyoqidw/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.edlazgkha.irnyoqidw/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4287

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.edlazgkha.irnyoqidw/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    ad9197cee20d7475f090f4f12c0289e5

    SHA1

    7c030217b441fe2e5ff7cac98e849dd40bd6cb62

    SHA256

    c9d08d28e4cd08666143af22850a15b81eb198bf7f6d2bd0cb6266063d46b4ac

    SHA512

    25cd074bc777ff9dfe0e0ec14b210bedf6f8c0ec5dcd5f8dfaf386c5de75340d489eae2c53daf8590bd6c2db212574f7b916f6028aa939c50f90573c3f2821f9

  • /data/data/com.edlazgkha.irnyoqidw/cache/classes.dex

    Filesize

    1.0MB

    MD5

    932554d27320304175cba774d54bc428

    SHA1

    30cb5e7b4d5557bcdec4a6c49d5d247fb8333315

    SHA256

    2445ba14cc0a490d0e414ac4e4acc1c1d126978a1f30c88691f66b5452e4f860

    SHA512

    61d2d1182c6d7a8b4cbae0f22d92122c2e4da86bdb124499c51a2dfa5a5148859bbf06ea90402a7a41579dc6bda8b1e52185f1829d9474f440079519599fc6af

  • /data/data/com.edlazgkha.irnyoqidw/cache/classes.zip

    Filesize

    1.0MB

    MD5

    cfc8449bc16c3430ee8de6b9df057feb

    SHA1

    30fb6641aa0cbb9e6b2432093cb23b697c60e818

    SHA256

    1d009a1dbbe82cecba54754d65981b9dcc41182b5b1b62180346c8b5ce7aa738

    SHA512

    aaafeb44b183d00bc53adfdab247d9c47e4a5d65e5ab80e3702ee2c5347e4938b5eb20bf0a96ad72641701001de9677166efbb124196afc99846abfc3946778f

  • /data/data/com.edlazgkha.irnyoqidw/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.edlazgkha.irnyoqidw/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    814230eb886e07014d4e8ab57a2f43ca

    SHA1

    13de92dfe5fd0d59ef1f2752fd775740a3e4c929

    SHA256

    c7692ca8054727890358f665f4d42b70357639f728cfdb65a82016fa2d759486

    SHA512

    5b44a2528626da3cb390a0d7084ce9c296cc04ea10714c4b5b139147d331cafa94a89687dc35b0e25ad8340c2682fb84f6c5793c0279cd2dbfa56492563f7264

  • /data/data/com.edlazgkha.irnyoqidw/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.edlazgkha.irnyoqidw/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    ea48c7945a99557b8b268048ffb622fd

    SHA1

    d13ea2664a03f1cf1c6ee0a3b6ca837dc11e04cb

    SHA256

    19d4aa1ebcdb1ecdb21e83ded8d226472cd6fa0c9e896055b5eeac7008ec95d1

    SHA512

    552bf956673a42c2d9ee7e8c219b37db134cc7419f4ce74480af3ab6bcb3fb52ea8ad45e9225ed47ca0a126a73e321d406997da4d5cf5d7ca063967215d5312b

  • /data/data/com.edlazgkha.irnyoqidw/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    9d1c28a344f9b1c243f3909ca72e38ff

    SHA1

    d57fe321528610e41038565a4e5b0b832ecc2c8b

    SHA256

    0019c5670eea4f5f1d0b7a8cd7d8730c015c27632351d8ac5fdd947c4aef57f3

    SHA512

    05b9cc77e7bd44883a765a9d7410d08ba728aa3310ffe0574598bba2e6f9fde97886122fb87c2122267918497274ad1997b90d19d3ec82e5dfa493827af97e09

  • /data/data/com.edlazgkha.irnyoqidw/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    2182ad3c0978f47bf48f35043e5bc667

    SHA1

    71c82af26f84bb1ec16da2f6c438269cc7c9b72d

    SHA256

    3dc9a37226449232707be2239d3b4fc46ebc348c160873c2781aab4b54b362f5

    SHA512

    655c14f02e60906f97a9012ab2193332c28e03ccbc88f096a17352fa28da5b2e7f0d3d0705505df90603a26ade5c4efb28864c9aeb2ed49b628d6811963064bc

  • /data/user/0/com.edlazgkha.irnyoqidw/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    89bc72326b93b4dadcec00c45faec508

    SHA1

    3bcd4c211e8656f00d37cb3621d915784f60bd27

    SHA256

    0ee9fded96ea31514ea3c76174f8bc7738b8a6ef51eea0caa46dd088adfd100e

    SHA512

    62f135eaadf3eea3f037f77f6bba324c30212305c6508a77e2045601ecc0347db76136bdaa99056ce278acde82b8e8bbf0c3f24f166e002f676166081013961e