Analysis

  • max time kernel
    142s
  • max time network
    156s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    02-11-2024 22:06

General

  • Target

    d68ca0a59f72f29816c91f58ade481658b948c3dbd09592fe29195e54c52347a.apk

  • Size

    4.0MB

  • MD5

    4711b383734211013cf306a6629a0a1a

  • SHA1

    8b4ae329edb16d64248c96b903859fb548a1a7b8

  • SHA256

    d68ca0a59f72f29816c91f58ade481658b948c3dbd09592fe29195e54c52347a

  • SHA512

    76cd8d0f81ecf20f00cbac7c6a1b96843826753aef724f22d97f04cdf118855ef8aa929a19accc90acc5ab517c1bfcf70f34a5fbabdb300018bbfe0aae08266a

  • SSDEEP

    98304:fWOtvSrqZJffEIUESHsuZuKV7D+NtZQ5HTFeHUrV:OivCqf0IUx/YsDCQ5zFeHUrV

Malware Config

Extracted

Family

hook

C2

http://193.143.1.24

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Reads information about phone network operator. 1 TTPs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.ttzqxpruo.pjlppftcl
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4495

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.ttzqxpruo.pjlppftcl/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    8a0b66424df03e24a1020de6fecc99bd

    SHA1

    301a0d9c88a7e9a18241fc8d8c0d77a6a34ebe21

    SHA256

    8e006f4d8711ab649dc09572685a3e602c6604399227b58dd4e3e42a4ade894f

    SHA512

    f7b98d213ef3595fab813d6a70df428eea0ff767cf8a3177dd3de1979ee029d3d496c315b863140c78400eba61b6553614d6208d935b05f19757b82c0822c9a0

  • /data/data/com.ttzqxpruo.pjlppftcl/cache/classes.dex

    Filesize

    1.0MB

    MD5

    3899553dabe203e404e1f7f8e8235c09

    SHA1

    10b4cbbedb9a80f7abbc62833654a5cc967911b5

    SHA256

    bcbadd2043710fe22898242f36e097e781ae229c36f5012e4a8f6d0f11912dec

    SHA512

    6687122045145bc1cc9f80998e3aa11e3eb744766bc2c079d826d9a2e8250802e268d8663d5a8dbac3aa4c055f8598d5456cd0d6f22cc74dc2fe420f6e4c159e

  • /data/data/com.ttzqxpruo.pjlppftcl/cache/classes.zip

    Filesize

    1.0MB

    MD5

    d9d02550db49324b771c8e61b2efa02e

    SHA1

    fb0a35adb6f1eb270811e3af8f004ae63e20f5b2

    SHA256

    29767c8295c1fe8105b2b11f4a3206652ef52b92aad0a980b6ed922bcf8d6fe0

    SHA512

    cc60d54518e9cc8cde7a75508ef582e29092871ab091dcbef51a735f259ab00e147bc09e7013c93b246b3d4784c2270be4c0608b27c6e3e54b65f70c429fe596

  • /data/data/com.ttzqxpruo.pjlppftcl/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.ttzqxpruo.pjlppftcl/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    ab9df75ec2c8e764fcbd74648608bf72

    SHA1

    79738f6922899abeb0b05332797d06de050620ba

    SHA256

    c921ed08830d2a4a4fed10c2df4ed440c23f6f23c9d4ee7b9e2a45d3a18f1d2f

    SHA512

    deedb93da976e7f5611c253fa0ebee46559ba62799fee6bf37fa7e0f5144e6a09284b65550f9a2ae44571c87df3a023077d1947ec87fe700a93b585ee75ed300

  • /data/data/com.ttzqxpruo.pjlppftcl/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.ttzqxpruo.pjlppftcl/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    5597aacdf47af00f14575054878a42f4

    SHA1

    1b3ec3b063c1d8749152c0bf3f366f500be751bf

    SHA256

    8adf253e705a323769fcb76e74eed4073ab380aafbde98f3380a7509d42e07ce

    SHA512

    c6a0f05d88f5f594078bf18a6a1cfd8360f0861ad6e5292874d638187cec639125e9e555cae13e24fdebc074f96aad24e4944776ccb2f4b670bf4cf60928d9f5

  • /data/data/com.ttzqxpruo.pjlppftcl/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    7005d1e3d73d08295f5e92e827e19891

    SHA1

    06bffa0ee55158e7ed00194eaf69474456f832b0

    SHA256

    0d3818848029bb5eb5f984d92d507ed5e39f0e1b9dbf7bf1ec0f9562cdadb9db

    SHA512

    d60179e8d2f1f086cd76b9160c131831d8ff0110246e429a52d7d3072f5146debe68d69b06f28174836e9b6d6e5c92a19a932b33c131e12cb055388fbec13ad9

  • /data/data/com.ttzqxpruo.pjlppftcl/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    72243c34ca6e8a66b378b15c1fcc0371

    SHA1

    d4ab8b7f64a5767fd5d1825c349efc71714317af

    SHA256

    3364d463fa80f70769392632dbefbc93c23e46b219a315e67da951e89bd3f342

    SHA512

    9be3e89a515e69a228b34cfa70a3f810ab2b9abff0abc3ae5b89f56c64f60559251d139d7d2eaefc3236dfc05ba5c58354b69e4d6027304314e9730b5146d488