Analysis

  • max time kernel
    36s
  • max time network
    154s
  • platform
    android-10_x64
  • resource
    android-x64-20240910-en
  • resource tags

    arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system
  • submitted
    05-11-2024 22:14

General

  • Target

    c8200eaad4e13d3d7c35eeb2ac54e7e89a39b38891a1a345a740f5b533eb925f.apk

  • Size

    4.2MB

  • MD5

    e09f806e15f3cd41dde1a382b2c00933

  • SHA1

    814c126bd525ad32e5d2f4b3e89e204fe58b36a2

  • SHA256

    c8200eaad4e13d3d7c35eeb2ac54e7e89a39b38891a1a345a740f5b533eb925f

  • SHA512

    0bf79e20533833569449411703ed0c9d22c5ca004450e9434900c6b06df6485825fbd5c46c2a35f9abbb20ca32a292249ede23d7b43596048bed99259ffb6dbf

  • SSDEEP

    98304:k54Oy6Z/5P8molTjcJSoq0RteIpjBCzX1CQIa6Q9QXGOhPwREEgcSRW:i4p6Z5QTjcJSweIpjBCb1Cab90foREEn

Malware Config

Extracted

Family

hook

C2

http://94.141.120.170

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.ybrgnfcjj.xohwzaamj
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:5099

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.ybrgnfcjj.xohwzaamj/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    982df7bc074ef36d309a6468bd0b3e1c

    SHA1

    e836a2e3c54ffdb06375e1e0d83c4d33965c6386

    SHA256

    17a2fc279da43a9fe3bd0131251c45dd8ee26bae1fbb7180024ca2654b627d55

    SHA512

    bc6218499157c0075e4c5547572d22630a672a0d5c1b53b063c635c51e3d94f50b034940ede1ab5562388e974f9a131532a2f1706d6f9e25d3b28e7861feadc9

  • /data/data/com.ybrgnfcjj.xohwzaamj/cache/classes.dex

    Filesize

    1.0MB

    MD5

    66c30f2f15865d98548b1b246f9e8ff3

    SHA1

    2f26780fa1087c8a9e0f374cd6c3f67dff327b0a

    SHA256

    2525dc01a4d4af6fba997344df5d63bb3db4dcbbb72fba245657794122a4c1db

    SHA512

    0a375dbc8ec63bfb60b4b2d7e0e4a0cf36bdcac07a2a1aeb43e2f5d278495409b6a4881921161e350385ad2af683b937ab9aebe154b140b7c9ce69f73f8d5017

  • /data/data/com.ybrgnfcjj.xohwzaamj/cache/classes.zip

    Filesize

    1.0MB

    MD5

    5112b5fdce794f97fe3a76f036516067

    SHA1

    c6238df555b5d0963077aab53a4076f16588a147

    SHA256

    3edf63903f9e93172685ae686abea3d6060167358c59c368829fcc8270b58172

    SHA512

    07e2de19c2a4cc12883dd777df9d58ee9fd2a0e234468ed42ec9f7f89f635587e0a58e3fe348296beb2976d009f24100cc8c714a7844f3ae938b5b1381e82348

  • /data/data/com.ybrgnfcjj.xohwzaamj/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.ybrgnfcjj.xohwzaamj/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    7f437a47c61f23645ea95b9dee1ff23e

    SHA1

    a19e0abeb4b5e32d7500e33bbe094e86a6d441da

    SHA256

    a29a709d7e7a1340746b97dde7cbc257fa49835cc4ef1825aea3f143ce8f61d3

    SHA512

    09c7f5db05eeb1e8579c4c15efb2855273698fe3549f57146925989804de365259413153e1a9098d1c3beb6bf65f2c1b4ecda00abcb7237b913e26beb402125a

  • /data/data/com.ybrgnfcjj.xohwzaamj/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.ybrgnfcjj.xohwzaamj/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    ced590c4b8ba75ce91ce62182536f5c3

    SHA1

    8b16bee7195a5ff851380cdc8d1047cc2659bad1

    SHA256

    c4b1422fe61f5fde05a2b1ebb53bd2a7c590284ab58e141fd92e241ccfc93304

    SHA512

    6d0a8a349f4099da0f862817c316672f05a5f9cda905e5c5e276cdc0b06febc49b8974a09ce98aac675956a9b79f37c33d66361afd0d7103100a0b9f756b53d1

  • /data/data/com.ybrgnfcjj.xohwzaamj/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    ce56e1d1a676662978a8f1dea1762cda

    SHA1

    d06e147027fc9e999ebad3ec6e4468ecbcc7e467

    SHA256

    13609ee747d8a6028bcb4235288b3a2a0d2899f4ad5f694a5473bee24076e07c

    SHA512

    bbc40c7503fc28ad5d5ce3e9d6336867b70851c5e7a9c5f3badc5aa077303e5e4ebbf26972150a1b86c6e408f0c7bb5bb24c6534c55185f8b368ddd0e2938b87

  • /data/data/com.ybrgnfcjj.xohwzaamj/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    ca44776c1473fb94d5d65969f9b50c18

    SHA1

    eaa4bfd1c467f772678833924bf079998d8d0c67

    SHA256

    69746e51dbd50b4cd7d5f2029fd9addcba363c25a9670a7e91f31a30872cc5ec

    SHA512

    1c368693028d7052c4b7cbdb729bf79db6b30dc4bf32990257fd38714b4f4b6817470811cdd24073e8e231ff1b08593a8446619f11bfd94fbd2bdb310e8f861a