Analysis
-
max time kernel
149s -
max time network
159s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
02-11-2024 20:29
Behavioral task
behavioral1
Sample
d6365924607d333ff864dab3fbbdcd015af784f8.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral2
Sample
d6365924607d333ff864dab3fbbdcd015af784f8.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral3
Sample
d6365924607d333ff864dab3fbbdcd015af784f8.apk
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
d6365924607d333ff864dab3fbbdcd015af784f8.apk
Resource
android-x86-arm-20240624-en
General
-
Target
d6365924607d333ff864dab3fbbdcd015af784f8.apk
-
Size
2.8MB
-
MD5
e18c7b2164b4367184a9d10e26f5d07c
-
SHA1
d6365924607d333ff864dab3fbbdcd015af784f8
-
SHA256
14b005352c07490b3689ac4eb187eb68d2b50cd135e57e1bca2f3469b10e2dd5
-
SHA512
aa296cf5d82bd1fcee51c757ccf86f74e520f4e81a4c880244d92dadb0188fb909784fbe205b89d8aa0d41b8dd8a4e24d4793a90590b488391616704ffe3c46f
-
SSDEEP
49152:wg/b8dl3tUGfjqejT3C9RQGk2v5GfmvJZtwLZGoAVSLD8Ib:lgl3tb7rPSoyvQsNwNucgIb
Malware Config
Extracted
hook
http://154.216.20.57:3434
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tencent.mm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.tencent.mm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.tencent.mm -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.tencent.mm -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.tencent.mm -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.tencent.mm -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.tencent.mm -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.tencent.mm -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.tencent.mm -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.tencent.mm -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.tencent.mm -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.tencent.mm
Processes
-
com.tencent.mm1⤵
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries the mobile country code (MCC)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4349
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD50eb157e1a86d4d00aa601dd2f6ff3ee3
SHA1fee434f784e73cc7916322e949f727caf8363102
SHA256b9a8194b71a046e8c0eb30995827b582b4bea834f630a5df2483b778a7d7d8a4
SHA512b9b79b8c3af8a3f140df230fd89e95206358ba50ff214e7323a2dbbe2937b795f970e588302ffd5d721318bd597ce0a27af26d6cdb07f45569c30209845082a8
-
Filesize
512B
MD52b2ddc4c31001f8a94eb7bfe48908810
SHA11a43268d131a337e53d4cbdc53de9dbd1056b87a
SHA2560a3758341874084d948b2e1e5c92904e9e45167941c4ba916f579ae85b9429ba
SHA5123a223792434388cde28eb51c428f8fe128a0177e56da8f2d83df47d3ec68aef1d6e837fe1dfccc008c3f10d349cce2aa2cce67a7e5f1ab6e2785af40184cbcb9
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD51feb812d64b36cbea637f3986ccfea3e
SHA18d669cbf94be10498528f93de65d29439d2cbee3
SHA256f316136554767e2cad0ae33ab400724c310271da43a4ea5f94f112156469f36a
SHA5127bffb0f6c69a0ffb9f8ddcbd0f7023f5738ec57e7ce1ae344571f15215ce08ac7a783a3bc687598eec84c474416af76cc10bdaf93c54c5e3d076a939519e0455
-
Filesize
108KB
MD55c34811a40171242826fcdbd4562ea91
SHA12880181c287ad950aa478d8a90b2312b33f5883c
SHA2561c65f34bb10c2679d9131a632e7f49f39938561e45c0d7b56daf305237a97d56
SHA51272e97a049feee6e153703ee60d31e3ee44e264f986660f106b1fde3e1892483f58c841103edb510227c89250c23645bf837bcd4ea7477d59a0d5914da2f2f80e
-
Filesize
173KB
MD5f0aa939852ba717f56d1d7c30a10e3dd
SHA104561500d4ad05b9dbeeafa3b449d289bd6ae6f7
SHA256300e038e55104993fb08bc6ec650052de79326d637b7aabf652ec58b357b0516
SHA51200a88d242c6e6d313e03b1d3e42f08f46b5859ff17ad889c5d4f57d28bdeafd231529828a1b0aa2af852968ba5b0a5bf2771ecf185ee40cf4834a7d1776a6958