Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    android-10_x64
  • resource
    android-x64-20240910-en
  • resource tags

    arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system
  • submitted
    29-10-2024 22:09

General

  • Target

    8525e732c00a2d03ffcd3202958ebc6ed5b377391c891f0f5aa520c8121bd130.apk

  • Size

    4.0MB

  • MD5

    da124020a3f0aa07cc90f999ac5f0d5e

  • SHA1

    40fa5e0e4d21bc97c04528814ed4013c3cabc1d4

  • SHA256

    8525e732c00a2d03ffcd3202958ebc6ed5b377391c891f0f5aa520c8121bd130

  • SHA512

    866fc0a58fbb63caeed1affce3b770615140d5b6ec2d36cd7ac9a9abd93932401845bf183988a00a7d08c48ba87cbceafbc294769caed635b46f2f27af71f060

  • SSDEEP

    98304:aVoHhRpG7lPdTx+BJC3499PHAgvqYhwD+uyVum5jBH9su8:/5M1TIXC3UHDVhwiuyl5zsR

Malware Config

Extracted

Family

hook

C2

http://193.143.1.24

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.edlazgkha.irnyoqidw
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:5053

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.edlazgkha.irnyoqidw/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    ad9197cee20d7475f090f4f12c0289e5

    SHA1

    7c030217b441fe2e5ff7cac98e849dd40bd6cb62

    SHA256

    c9d08d28e4cd08666143af22850a15b81eb198bf7f6d2bd0cb6266063d46b4ac

    SHA512

    25cd074bc777ff9dfe0e0ec14b210bedf6f8c0ec5dcd5f8dfaf386c5de75340d489eae2c53daf8590bd6c2db212574f7b916f6028aa939c50f90573c3f2821f9

  • /data/data/com.edlazgkha.irnyoqidw/cache/classes.dex

    Filesize

    1.0MB

    MD5

    932554d27320304175cba774d54bc428

    SHA1

    30cb5e7b4d5557bcdec4a6c49d5d247fb8333315

    SHA256

    2445ba14cc0a490d0e414ac4e4acc1c1d126978a1f30c88691f66b5452e4f860

    SHA512

    61d2d1182c6d7a8b4cbae0f22d92122c2e4da86bdb124499c51a2dfa5a5148859bbf06ea90402a7a41579dc6bda8b1e52185f1829d9474f440079519599fc6af

  • /data/data/com.edlazgkha.irnyoqidw/cache/classes.zip

    Filesize

    1.0MB

    MD5

    cfc8449bc16c3430ee8de6b9df057feb

    SHA1

    30fb6641aa0cbb9e6b2432093cb23b697c60e818

    SHA256

    1d009a1dbbe82cecba54754d65981b9dcc41182b5b1b62180346c8b5ce7aa738

    SHA512

    aaafeb44b183d00bc53adfdab247d9c47e4a5d65e5ab80e3702ee2c5347e4938b5eb20bf0a96ad72641701001de9677166efbb124196afc99846abfc3946778f

  • /data/data/com.edlazgkha.irnyoqidw/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.edlazgkha.irnyoqidw/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    dcecfa93e7dad22833f10f71284be03d

    SHA1

    3bd80e6b37021743c6cbf30b00b22d19aa45b8a8

    SHA256

    c2123bb87304dd3076862c4a09d53fce5a1595b338e1c7618c658706a32bfc43

    SHA512

    42bfe9a35ef8017d538da50d1131ea29740a9105a5cb288f8d6d0a7c16c8492e62d288f8d425162a03d31a0e946f870cbad17e478d289fa523fcb07e7c811892

  • /data/data/com.edlazgkha.irnyoqidw/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.edlazgkha.irnyoqidw/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    9eb51ef25fa45ba43b661aa4a82eaefe

    SHA1

    c855bdda96e6027666a2d9dcdf50d30193d291dc

    SHA256

    5c6e92b2c54b92646e1bb306bc4e3308489a3863dbd2463c203b714d803041fa

    SHA512

    f32705ed2debdd39e4c74a573c07f94e1e9f74328b7ca68f87284fd3320c0abebdd998e6feb3e64a73c5e2e42211fc7f450837530b64c3d48dad0d9f638b289c

  • /data/data/com.edlazgkha.irnyoqidw/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    cee65b8a39a55654de79d4838f5c9e60

    SHA1

    cc049e961765ba0f67abed03e5d4fde176adb18e

    SHA256

    7ba0a1a8ec2e9304f5b5f890b8a119d3091678066a0cad248cbd62b352fef725

    SHA512

    00346e0c3f7e1f5d760192c0022c26a0c1be023a70920b73e050eb0dc19b9c2c57f0b2aea16f3f187fec87bc44fef9ee7732321e1b9376d7e0fbda098456fde1

  • /data/data/com.edlazgkha.irnyoqidw/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    6afd0a9209cbf257ca0cfb8da67f2481

    SHA1

    7600f699c8890e577e172714a75a996bac0409b7

    SHA256

    71f41415443f11d507f21578175c68b15ab0a4f115417f0c675885c0343bd22a

    SHA512

    b304621cfe4c4e7082f5550de7c6827a1a61d36ada3dd215d9a14bb5105ab47e57e88ed69c94f570a064c72d0feae06c305de968e7cbd5f920977060b558dbd3