Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    06-11-2024 22:09

General

  • Target

    a75eb15a5a79c91fa17e3da290583033d8f5ba1eb628c80fa795c1f2a4f64405.apk

  • Size

    4.3MB

  • MD5

    0d65aee98eb0efb5ceb0644bb90544a7

  • SHA1

    bbab5e4d1067eb545c04e4e8387822d1ff6744b4

  • SHA256

    a75eb15a5a79c91fa17e3da290583033d8f5ba1eb628c80fa795c1f2a4f64405

  • SHA512

    e666da9d8d9aff200b8d99b9b1ffe4b409473a26c994e8821fbb7f6a0bb731c5e7f45a64e44a21ae768f0cfc5cf6a07582614e2fc285ed088b963561fba26945

  • SSDEEP

    98304:9q5GXeBoIDwWmqGVfvz4tyMIMntintv8Tubn53hIsYiNy8n65Xmdurh:sAeBbDwWm/vMBStdnVh7nhurh

Malware Config

Extracted

Family

hook

C2

http://91.202.233.15

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 18 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.vmcsxchqc.rmwmcfywx
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4831

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.vmcsxchqc.rmwmcfywx/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    e2cd81a6a3e3cb9d6c5584ea55653c13

    SHA1

    e75fa832d3a31c338d86b17609e62ed91357b72a

    SHA256

    3d3c95646f6a86493685d64a9dc7362f4f84c3394463f32a61adc7b3c9d07241

    SHA512

    1f5b5afd4aa0cfc049166f7461deea4164c2c230cf3fb6e128dad072f13e03df350ede0a8b8a4b4512fda8d579c2495a52b98232ab27367096b5707de191dbfd

  • /data/data/com.vmcsxchqc.rmwmcfywx/cache/classes.dex

    Filesize

    1.0MB

    MD5

    697d90cf18b6189b707aa18ee4057322

    SHA1

    807e466d986783e32e41f4de8323aceadd0d429f

    SHA256

    a959145b9575328748825d5eb5abe8a97b86e26f1dafa462e91fe5d84477f963

    SHA512

    ad5f77101b238c036a46f75cffde6b72c7185b1bd5a7cb396ec7b657c92cf90cbe0bf80b5a868cd318fdbb5139186a808869aa248222439f62a4f64286cf8776

  • /data/data/com.vmcsxchqc.rmwmcfywx/cache/classes.zip

    Filesize

    1.0MB

    MD5

    aae366e8367699c4a5cb9320d7c9d16c

    SHA1

    400f324ccf5773749ad37b3afa9b58ce5ef1cf33

    SHA256

    41baf2681352fa19b42b4448d0195c5d09a6096d99c31ee6151155b60737400e

    SHA512

    edd3d8ee0c14572bc91c510b21a5ac89e505bcccd7abedc5488f2b4d9fdcd73d70810c40db8917c1e9599a1a5a369aa3ff1f19949d3861dc81c3929b57982cc3

  • /data/data/com.vmcsxchqc.rmwmcfywx/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.vmcsxchqc.rmwmcfywx/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    54a45f75d68b53d3d89c31c91e7dfc8e

    SHA1

    5a44d5632ba291d58ec10664b7872c96068f4433

    SHA256

    5c1569867fab70415ec1a762320b43f63361cd3615456d7494b85d0615dbc529

    SHA512

    057c2f8275e8d561bfd76a357dacc44a88c4a2abe2d93dad45e9e40513fa6090abc54570cbe588e3e31c1b8756477030cddee37810167f56679c79a66e9971a2

  • /data/data/com.vmcsxchqc.rmwmcfywx/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.vmcsxchqc.rmwmcfywx/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    6d28510d3f179bc7c92fa9f5d1e26dab

    SHA1

    635722ca617cb1fe6ca4e2e5fc953b4305cbec68

    SHA256

    09680b493b3180a12941c7db38cdbc1cbf3442cbc5adce8e4ccb4d5bbba1212b

    SHA512

    53c8b1a16cf77433ff980fa21f4bf58dffb5e7b6b7627038577fb3f8a35926b16e938051521c5c85945815828703f613303c0af709ac4c173159ca13e4d36234

  • /data/data/com.vmcsxchqc.rmwmcfywx/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    54146c8a47cfdc6755d9091b4438d5d6

    SHA1

    0fe67e75f322c59f3f056d141fa4eac78a4e8c3a

    SHA256

    b6961908b520d5b0085dc6d28ea3643b942359fbfd0852c0d0ff2376f6928561

    SHA512

    7c7a4f9c5178146ce06048276256f782b5d44f774f7fd9036904e0cd43e38ba3820ca88a75b6b37a388a0cffe2e4f2bffd3e35489c09fbc39ff7c7d8c0838558

  • /data/data/com.vmcsxchqc.rmwmcfywx/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    64fe57bfd2c5e5687a386018e47e293a

    SHA1

    b5ddb4c1b6e1586c2871a403940a928e145fca8f

    SHA256

    0f6b5454d0c479f3d9701f7923b59520420e18cbd185bbe633823da419c76aab

    SHA512

    ba0eaca90726f61b954f89bdb68cd5b361bddb0e30c4885c9645107a65f4dad27edfc3080fd4e15d7cfab3a2cd2214b93a62ca3448ab49e9c1170ebb269e628d