Analysis
-
max time kernel
149s -
max time network
160s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
07/11/2024, 22:03
Static task
static1
Behavioral task
behavioral1
Sample
f686000f7ddff9b4ef731b226ddb374660963b08a736fe03a55e57471b19ee9b.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
f686000f7ddff9b4ef731b226ddb374660963b08a736fe03a55e57471b19ee9b.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
f686000f7ddff9b4ef731b226ddb374660963b08a736fe03a55e57471b19ee9b.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
f686000f7ddff9b4ef731b226ddb374660963b08a736fe03a55e57471b19ee9b.apk
-
Size
4.6MB
-
MD5
65fb2f32a25169a03c4692f69212340c
-
SHA1
58d5132a9728fdefa61556e11b637f85f3e7a650
-
SHA256
f686000f7ddff9b4ef731b226ddb374660963b08a736fe03a55e57471b19ee9b
-
SHA512
3b8dfb7bdd91deba5e059405602cf4f0faf8c65507e150508b940c6d5fb7945cbbb58d99bf6a94fe4a6032ccc7ab3da2c943f0fd063d643d02fe71911544c8ca
-
SSDEEP
98304:Ilyc0viX5Pahf5TWQCLZE7yUI6nNjCpCdH4v4ZCaKIbrzgr:IlycaoMBaQCFE7yUI6nNmCp4v4ZCSbrm
Malware Config
Extracted
hook
http://89.248.201.43
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.codurqpgk.swtmhmofh/app_dex/classes.dex 4264 com.codurqpgk.swtmhmofh /data/user/0/com.codurqpgk.swtmhmofh/app_dex/classes.dex 4292 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.codurqpgk.swtmhmofh/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.codurqpgk.swtmhmofh/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.codurqpgk.swtmhmofh/app_dex/classes.dex 4264 com.codurqpgk.swtmhmofh -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.codurqpgk.swtmhmofh Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.codurqpgk.swtmhmofh Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.codurqpgk.swtmhmofh -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.codurqpgk.swtmhmofh -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.codurqpgk.swtmhmofh -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.codurqpgk.swtmhmofh -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.codurqpgk.swtmhmofh android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.codurqpgk.swtmhmofh android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.codurqpgk.swtmhmofh android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.codurqpgk.swtmhmofh android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.codurqpgk.swtmhmofh -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.codurqpgk.swtmhmofh -
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.codurqpgk.swtmhmofh -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.codurqpgk.swtmhmofh -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.codurqpgk.swtmhmofh -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.codurqpgk.swtmhmofh
Processes
-
com.codurqpgk.swtmhmofh1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4264 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.codurqpgk.swtmhmofh/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.codurqpgk.swtmhmofh/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4292
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Process Discovery
1System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD558a128117231098ae3b9d50a5d27e1e3
SHA14b1ef36362e4fe38db6990ee84fd545eb62b0d6b
SHA256e4c872ddb8fc8934e8297db9e83d0983a036b8602824e8ab8353b76548ba0420
SHA512e3abb45e04e482157d4e40c6dcf9a3da1b91f4998d1627f96c08ec9e435867f5e9ba28ce8a121c29abcdeb2668ac599e04c9a9e5415c6590ed45a0de453c4576
-
Filesize
1.0MB
MD5933f265e9c9604ffd2488da40d4c4915
SHA110dbe95819a83f4ae13efa4fbbe8bdcabd973ad3
SHA256b3018cb63c1de103755d3cd2b8b14c0dacc8771153681754eecb8a3d68920a52
SHA512ca41f2c1d771cdcaba9ad33ced3edcb1aec23cc15f6fbe521b5b966787866d6e88202790d05db3538771277028751341f84350d0f923acc270a3320c70373d78
-
Filesize
1.0MB
MD5926c734646a65c874648c08cb4f3ba2e
SHA17b0fd2ed4fd3011ed07ba4eca632c4560eb2409c
SHA2566a92c42ccd5757f03b04f0c28ebfd9bacdcab77089e9ebff54c686d4d8c4f211
SHA512022261fce3ff261680a75596a88b3c640f15e9108304cd56efb8fcdac0aa6ad3323d120387ab7bcbc4e5df20530290aaf21d38dd29be671279bfbcf310a08f2c
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5e5e6809c9970b38459bec584a1bb5956
SHA155444ffde2181b110a0e35f3d34d3cdeb137af40
SHA256ab3d63e12ac7627c7636642f525d07e053aaa0433b8ffb8ead4a1b685d50e860
SHA5126b0429ae3d378efa85b9c7e534c883408f01c094898d1bd09a558de683c99d35014e631f136404354a986b2f0328159cea591b6e6dd972ae4599b1b2a364f7ae
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
108KB
MD509c81c12f84eb0d94cef06ac4c8857bc
SHA147f241abaebefc50e1c341079f4b00c41746fbc6
SHA256357d3931fbcfa778cdc20e3b70b420c5ac983e14965d115245ce3673f393aeda
SHA512b97a49cc8957c139952de9eaf30385b1c25cb37dc02d5ec3bd17622b789d2c3c86275c095dc9e5568016c7a5bdc4f8920cb7735e0b7aabc036ca446a200d0f56
-
Filesize
173KB
MD59db84dcd94bd58868b92a6a812399fc7
SHA15b704378da0dc749f4fcaefd4272935814696aed
SHA25696a720f30347861cec473b36d9e2f858b7509abfb4b63cf36100def90b7e3b74
SHA512b265d05366ab7f8beb82e7af577e3997f9dc1f9725541d907f508c9abdcd01271f7e3445409ad9679d0933226d9be16b6da1c08a6e0b523cfcf6069c752768e9
-
Filesize
16KB
MD5db78a35fecfe8647d7801ac8917f17f0
SHA16ffa6d7c573bed58756a94289df14ee8e975643d
SHA2565ae972df69ef04e12178a47ea7ce0c4bcb787ba2746a41885c50ab0534f762fa
SHA5125e0d7ef2211db39b585c75583b868eaf0e3dfcdfeac3503e342827cdf0f12d08ba3faa394e323c225eab5fe9e0ea88ce096911266cac51ef441033eaf18c78fd
-
Filesize
2.9MB
MD5ad744b70505d9eae529e3d2131a75a2e
SHA143b57b6abefd24c8e27885e68ebd922614bbca0e
SHA2561117b21d967dd165b2a979410f23c332a3588c848ddba674e98430c36d5e54f6
SHA512ccd2711cb506eb203bbbf996aa95533dc947bc3ff47a5021ddf73786400d34f737a20efffa04e21c899300b897452e75b49c44d773f9c8beed651c75ac0a4805