Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    29-10-2024 22:09

General

  • Target

    8525e732c00a2d03ffcd3202958ebc6ed5b377391c891f0f5aa520c8121bd130.apk

  • Size

    4.0MB

  • MD5

    da124020a3f0aa07cc90f999ac5f0d5e

  • SHA1

    40fa5e0e4d21bc97c04528814ed4013c3cabc1d4

  • SHA256

    8525e732c00a2d03ffcd3202958ebc6ed5b377391c891f0f5aa520c8121bd130

  • SHA512

    866fc0a58fbb63caeed1affce3b770615140d5b6ec2d36cd7ac9a9abd93932401845bf183988a00a7d08c48ba87cbceafbc294769caed635b46f2f27af71f060

  • SSDEEP

    98304:aVoHhRpG7lPdTx+BJC3499PHAgvqYhwD+uyVum5jBH9su8:/5M1TIXC3UHDVhwiuyl5zsR

Malware Config

Extracted

Family

hook

C2

http://193.143.1.24

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 17 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.edlazgkha.irnyoqidw
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4782

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.edlazgkha.irnyoqidw/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    ad9197cee20d7475f090f4f12c0289e5

    SHA1

    7c030217b441fe2e5ff7cac98e849dd40bd6cb62

    SHA256

    c9d08d28e4cd08666143af22850a15b81eb198bf7f6d2bd0cb6266063d46b4ac

    SHA512

    25cd074bc777ff9dfe0e0ec14b210bedf6f8c0ec5dcd5f8dfaf386c5de75340d489eae2c53daf8590bd6c2db212574f7b916f6028aa939c50f90573c3f2821f9

  • /data/data/com.edlazgkha.irnyoqidw/cache/classes.dex

    Filesize

    1.0MB

    MD5

    932554d27320304175cba774d54bc428

    SHA1

    30cb5e7b4d5557bcdec4a6c49d5d247fb8333315

    SHA256

    2445ba14cc0a490d0e414ac4e4acc1c1d126978a1f30c88691f66b5452e4f860

    SHA512

    61d2d1182c6d7a8b4cbae0f22d92122c2e4da86bdb124499c51a2dfa5a5148859bbf06ea90402a7a41579dc6bda8b1e52185f1829d9474f440079519599fc6af

  • /data/data/com.edlazgkha.irnyoqidw/cache/classes.zip

    Filesize

    1.0MB

    MD5

    cfc8449bc16c3430ee8de6b9df057feb

    SHA1

    30fb6641aa0cbb9e6b2432093cb23b697c60e818

    SHA256

    1d009a1dbbe82cecba54754d65981b9dcc41182b5b1b62180346c8b5ce7aa738

    SHA512

    aaafeb44b183d00bc53adfdab247d9c47e4a5d65e5ab80e3702ee2c5347e4938b5eb20bf0a96ad72641701001de9677166efbb124196afc99846abfc3946778f

  • /data/data/com.edlazgkha.irnyoqidw/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.edlazgkha.irnyoqidw/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    667bd9c9a8bea557b6b02f58bba7f325

    SHA1

    5370fefe1ad1a3d11eae88c479ccce1bd585dfc3

    SHA256

    121aa9728dd98e506124c77c6980ec57f929be637430d7990e29d9812f8d8484

    SHA512

    3cc888e9d89e85a22e77690dffc87e5839489835cd3350c5ce52e07aacd9ddfefdd6f7c61fb4879210d32a2c1aa2abb3bf4022276819c04ecd62016f681d2d3b

  • /data/data/com.edlazgkha.irnyoqidw/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.edlazgkha.irnyoqidw/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    cf97017352d08aadf4ae72e6871afdd2

    SHA1

    70f5a769cf478bbde8b532d40bc324213a27db12

    SHA256

    3f6a885384cdd36d5649109c0646d28d9efa550ec05d4ada90b8ef102e25afb6

    SHA512

    4fb0aa32cfea22951270c4caf35f4b86f788ddfe7ab738c4160bf79c9883037c80c0bdcc8acc6c227541e9bc27d06107d0fdb1bc29983635d0634dd57b299333

  • /data/data/com.edlazgkha.irnyoqidw/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    8df4c765bd39b9b43b49dfee8776bd69

    SHA1

    419227ba0f6ac95b6b478c8945147d357d1e148f

    SHA256

    a357b6cbbd2a5c0393e5223cde1bf6118b44f71a59a60da6ab5bd48b88cb4c06

    SHA512

    5e94a22411bfebe5af404e238fa2fcf04e0227b171f3bead0835bd5040515686780b19bce147f6d8e498d416b707bf7781da12df12b79954a1f1936226da2bb7

  • /data/data/com.edlazgkha.irnyoqidw/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    f81a0145ba24451be01ca236d91ec2a8

    SHA1

    1fcc2b69605ae4707c2fd20683aec78dca98daa3

    SHA256

    f0c9cb44f29c965b2a238452b2411e5b677fc55d3de4e6b0e3df2fbe91138cf3

    SHA512

    006d6e1af322b6c5943f40f89af7d545fba2eb5c129064f396a2ddd209d759cc0dcfda5ba7849cc81e96644547984dd15f79a32418575800badbcd0dbde20c09