Analysis

  • max time kernel
    148s
  • max time network
    161s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    05/11/2024, 22:14

General

  • Target

    c8200eaad4e13d3d7c35eeb2ac54e7e89a39b38891a1a345a740f5b533eb925f.apk

  • Size

    4.2MB

  • MD5

    e09f806e15f3cd41dde1a382b2c00933

  • SHA1

    814c126bd525ad32e5d2f4b3e89e204fe58b36a2

  • SHA256

    c8200eaad4e13d3d7c35eeb2ac54e7e89a39b38891a1a345a740f5b533eb925f

  • SHA512

    0bf79e20533833569449411703ed0c9d22c5ca004450e9434900c6b06df6485825fbd5c46c2a35f9abbb20ca32a292249ede23d7b43596048bed99259ffb6dbf

  • SSDEEP

    98304:k54Oy6Z/5P8molTjcJSoq0RteIpjBCzX1CQIa6Q9QXGOhPwREEgcSRW:i4p6Z5QTjcJSweIpjBCb1Cab90foREEn

Malware Config

Extracted

Family

hook

C2

http://94.141.120.170

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 18 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.ybrgnfcjj.xohwzaamj
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4779

Network

        MITRE ATT&CK Mobile v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • /data/data/com.ybrgnfcjj.xohwzaamj/app_dex/classes.dex

          Filesize

          2.9MB

          MD5

          982df7bc074ef36d309a6468bd0b3e1c

          SHA1

          e836a2e3c54ffdb06375e1e0d83c4d33965c6386

          SHA256

          17a2fc279da43a9fe3bd0131251c45dd8ee26bae1fbb7180024ca2654b627d55

          SHA512

          bc6218499157c0075e4c5547572d22630a672a0d5c1b53b063c635c51e3d94f50b034940ede1ab5562388e974f9a131532a2f1706d6f9e25d3b28e7861feadc9

        • /data/data/com.ybrgnfcjj.xohwzaamj/cache/classes.dex

          Filesize

          1.0MB

          MD5

          66c30f2f15865d98548b1b246f9e8ff3

          SHA1

          2f26780fa1087c8a9e0f374cd6c3f67dff327b0a

          SHA256

          2525dc01a4d4af6fba997344df5d63bb3db4dcbbb72fba245657794122a4c1db

          SHA512

          0a375dbc8ec63bfb60b4b2d7e0e4a0cf36bdcac07a2a1aeb43e2f5d278495409b6a4881921161e350385ad2af683b937ab9aebe154b140b7c9ce69f73f8d5017

        • /data/data/com.ybrgnfcjj.xohwzaamj/cache/classes.zip

          Filesize

          1.0MB

          MD5

          5112b5fdce794f97fe3a76f036516067

          SHA1

          c6238df555b5d0963077aab53a4076f16588a147

          SHA256

          3edf63903f9e93172685ae686abea3d6060167358c59c368829fcc8270b58172

          SHA512

          07e2de19c2a4cc12883dd777df9d58ee9fd2a0e234468ed42ec9f7f89f635587e0a58e3fe348296beb2976d009f24100cc8c714a7844f3ae938b5b1381e82348

        • /data/data/com.ybrgnfcjj.xohwzaamj/no_backup/androidx.work.workdb

          Filesize

          4KB

          MD5

          7e858c4054eb00fcddc653a04e5cd1c6

          SHA1

          2e056bf31a8d78df136f02a62afeeca77f4faccf

          SHA256

          9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

          SHA512

          d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

        • /data/data/com.ybrgnfcjj.xohwzaamj/no_backup/androidx.work.workdb-journal

          Filesize

          512B

          MD5

          f9811de970ec86334b1c16ceb3233772

          SHA1

          31edfeb0383c02f87558514e3d6b00ddf2c4d063

          SHA256

          1feb4860aa7ab429d893f9518452b635a0ab303cec51a9d5e1caea5a5a2e2a39

          SHA512

          fe1b939670aab28e2723732d51f2997d201e47439acd31ccfbf19f63e4673f6031589034068174b4c422f8091cf4b6b6335ced1ab70c7e813bca4e80fbe24291

        • /data/data/com.ybrgnfcjj.xohwzaamj/no_backup/androidx.work.workdb-shm

          Filesize

          32KB

          MD5

          bb7df04e1b0a2570657527a7e108ae23

          SHA1

          5188431849b4613152fd7bdba6a3ff0a4fd6424b

          SHA256

          c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

          SHA512

          768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

        • /data/data/com.ybrgnfcjj.xohwzaamj/no_backup/androidx.work.workdb-wal

          Filesize

          16KB

          MD5

          3b529253a38d5ba8a37f555e7683e93c

          SHA1

          b047db5e34c3efae505f0b54d957edadfdde4354

          SHA256

          3be91a4a097f28662dd14d01011febb21b8cc05c739e93cc1495ce4266ce9cdd

          SHA512

          24e2665dd58fa27827428e59da99a8d82d9c76269fc72577172819aa8c01c1f1b18f6bc5439107f2568f085329b1a41713e49a561830def710db3f3c9ecdd1e8

        • /data/data/com.ybrgnfcjj.xohwzaamj/no_backup/androidx.work.workdb-wal

          Filesize

          108KB

          MD5

          8c87a4562d334d11760a8569382b731c

          SHA1

          0cbcdd0b6a42e46782e78aab19d0f3ff76676bd4

          SHA256

          fb5a71cda81c0bae7cfb1616b39b54f92417c171a461f20b7c575e445c16a4ff

          SHA512

          7c5b1e6af2ebc254d31030e9f3e7bf28a2d968078bff6b2a35dcd2b1dc26950e5a5ca0ab0bd93cff4efe64ad8b4822c4e84d5d0c12f0ea10a214d58b838430a0

        • /data/data/com.ybrgnfcjj.xohwzaamj/no_backup/androidx.work.workdb-wal

          Filesize

          173KB

          MD5

          00b0a632f45a8735a536901fea2fb0de

          SHA1

          f3182fc101465943d63693aae75503af37e1e8c3

          SHA256

          68370041d0b8605edc9cd502dca762d7cee287713a4ecf985666ca07298dc4a5

          SHA512

          b2b67b17f498424edd5a8b7d12fe6f3f37c088b921a8088594b953cb1e98e1dbdec4afb5754bdcdd58fd280affce0a7178ec08044ed57bbad59eed30cf88201a