Analysis

  • max time kernel
    149s
  • max time network
    159s
  • platform
    android_x64
  • resource
    android-x64-20240624-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system
  • submitted
    02-11-2024 22:06

General

  • Target

    d68ca0a59f72f29816c91f58ade481658b948c3dbd09592fe29195e54c52347a.apk

  • Size

    4.0MB

  • MD5

    4711b383734211013cf306a6629a0a1a

  • SHA1

    8b4ae329edb16d64248c96b903859fb548a1a7b8

  • SHA256

    d68ca0a59f72f29816c91f58ade481658b948c3dbd09592fe29195e54c52347a

  • SHA512

    76cd8d0f81ecf20f00cbac7c6a1b96843826753aef724f22d97f04cdf118855ef8aa929a19accc90acc5ab517c1bfcf70f34a5fbabdb300018bbfe0aae08266a

  • SSDEEP

    98304:fWOtvSrqZJffEIUESHsuZuKV7D+NtZQ5HTFeHUrV:OivCqf0IUx/YsDCQ5zFeHUrV

Malware Config

Extracted

Family

hook

C2

http://193.143.1.24

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.ttzqxpruo.pjlppftcl
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4977

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.ttzqxpruo.pjlppftcl/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    8a0b66424df03e24a1020de6fecc99bd

    SHA1

    301a0d9c88a7e9a18241fc8d8c0d77a6a34ebe21

    SHA256

    8e006f4d8711ab649dc09572685a3e602c6604399227b58dd4e3e42a4ade894f

    SHA512

    f7b98d213ef3595fab813d6a70df428eea0ff767cf8a3177dd3de1979ee029d3d496c315b863140c78400eba61b6553614d6208d935b05f19757b82c0822c9a0

  • /data/data/com.ttzqxpruo.pjlppftcl/cache/classes.dex

    Filesize

    1.0MB

    MD5

    3899553dabe203e404e1f7f8e8235c09

    SHA1

    10b4cbbedb9a80f7abbc62833654a5cc967911b5

    SHA256

    bcbadd2043710fe22898242f36e097e781ae229c36f5012e4a8f6d0f11912dec

    SHA512

    6687122045145bc1cc9f80998e3aa11e3eb744766bc2c079d826d9a2e8250802e268d8663d5a8dbac3aa4c055f8598d5456cd0d6f22cc74dc2fe420f6e4c159e

  • /data/data/com.ttzqxpruo.pjlppftcl/cache/classes.zip

    Filesize

    1.0MB

    MD5

    d9d02550db49324b771c8e61b2efa02e

    SHA1

    fb0a35adb6f1eb270811e3af8f004ae63e20f5b2

    SHA256

    29767c8295c1fe8105b2b11f4a3206652ef52b92aad0a980b6ed922bcf8d6fe0

    SHA512

    cc60d54518e9cc8cde7a75508ef582e29092871ab091dcbef51a735f259ab00e147bc09e7013c93b246b3d4784c2270be4c0608b27c6e3e54b65f70c429fe596

  • /data/data/com.ttzqxpruo.pjlppftcl/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.ttzqxpruo.pjlppftcl/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    24143479e01bb1f0f277a11e70ab72f8

    SHA1

    19ee30933512c39609c64fdf0b06c2f8ffa622d1

    SHA256

    aea303094b263cb6f1590c5e2c155ee92861ac20cc4a49f14551940f0cea9fbe

    SHA512

    b2483545d5b00edb15d80b1502b74432b714f317e577e2ffcdabdd049bcc9e8a77b5e321a5c65ecdfb2bbfa55a7bf6913b933d62d5cb7d3d7c10309595bcb6df

  • /data/data/com.ttzqxpruo.pjlppftcl/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.ttzqxpruo.pjlppftcl/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    c33be807e42a11c268c9c05734942b0f

    SHA1

    07eb803cd761390d53265e942569d91637d47c5b

    SHA256

    503893c292efa69f4765d6639a8c52d2463cde798eaf74c03c1bb6549914b633

    SHA512

    5ef7903a7ffae6d3638ed44e7c1f261997e527f5e5dd7b9e0c03ce3a08e3445d91fafb212a07b2f7099070ac94464b966230ea60527e80c7f36abcef3c97feff

  • /data/data/com.ttzqxpruo.pjlppftcl/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    deb7bfffeabbcef3ccdc06276d64d39e

    SHA1

    894d8298b23707c6dfd7b2325e91aec4dbb4adef

    SHA256

    913e44e156d95e15264f8d8e346e7ca78ca9e89456cf01f72c3c1b4520c0a1d7

    SHA512

    a337a72ea7c18c3b790dac2415f838c93cd7845aafca7b334303fec268559243de9fd072ae26bbc0afb2567919e2f2863a97ebe01cd8648f0391f81fec61bd2e

  • /data/data/com.ttzqxpruo.pjlppftcl/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    746ce5beb3f05dad9bcff989b580573c

    SHA1

    cf588c415f5edd002831d3759420d6b1168c75f5

    SHA256

    719c876204d0b3271340e8834cb4811df36d0c8af12c0ba7d4f53644f83ad127

    SHA512

    c25ef0e1a8134a3125ea680bb68469268854c95fb133a0a9232012366003cdb76bec2b8d23b771558b1646bc6809df96d1f355a4bb7b40f510a5655a7cf8ae73