Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    android-10_x64
  • resource
    android-x64-20240910-en
  • resource tags

    arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system
  • submitted
    07/11/2024, 22:03

General

  • Target

    f686000f7ddff9b4ef731b226ddb374660963b08a736fe03a55e57471b19ee9b.apk

  • Size

    4.6MB

  • MD5

    65fb2f32a25169a03c4692f69212340c

  • SHA1

    58d5132a9728fdefa61556e11b637f85f3e7a650

  • SHA256

    f686000f7ddff9b4ef731b226ddb374660963b08a736fe03a55e57471b19ee9b

  • SHA512

    3b8dfb7bdd91deba5e059405602cf4f0faf8c65507e150508b940c6d5fb7945cbbb58d99bf6a94fe4a6032ccc7ab3da2c943f0fd063d643d02fe71911544c8ca

  • SSDEEP

    98304:Ilyc0viX5Pahf5TWQCLZE7yUI6nNjCpCdH4v4ZCaKIbrzgr:IlycaoMBaQCFE7yUI6nNmCp4v4ZCSbrm

Malware Config

Extracted

Family

hook

C2

http://89.248.201.43

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.codurqpgk.swtmhmofh
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:5105

Network

        MITRE ATT&CK Mobile v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • /data/data/com.codurqpgk.swtmhmofh/app_dex/classes.dex

          Filesize

          2.9MB

          MD5

          58a128117231098ae3b9d50a5d27e1e3

          SHA1

          4b1ef36362e4fe38db6990ee84fd545eb62b0d6b

          SHA256

          e4c872ddb8fc8934e8297db9e83d0983a036b8602824e8ab8353b76548ba0420

          SHA512

          e3abb45e04e482157d4e40c6dcf9a3da1b91f4998d1627f96c08ec9e435867f5e9ba28ce8a121c29abcdeb2668ac599e04c9a9e5415c6590ed45a0de453c4576

        • /data/data/com.codurqpgk.swtmhmofh/cache/classes.dex

          Filesize

          1.0MB

          MD5

          933f265e9c9604ffd2488da40d4c4915

          SHA1

          10dbe95819a83f4ae13efa4fbbe8bdcabd973ad3

          SHA256

          b3018cb63c1de103755d3cd2b8b14c0dacc8771153681754eecb8a3d68920a52

          SHA512

          ca41f2c1d771cdcaba9ad33ced3edcb1aec23cc15f6fbe521b5b966787866d6e88202790d05db3538771277028751341f84350d0f923acc270a3320c70373d78

        • /data/data/com.codurqpgk.swtmhmofh/cache/classes.zip

          Filesize

          1.0MB

          MD5

          926c734646a65c874648c08cb4f3ba2e

          SHA1

          7b0fd2ed4fd3011ed07ba4eca632c4560eb2409c

          SHA256

          6a92c42ccd5757f03b04f0c28ebfd9bacdcab77089e9ebff54c686d4d8c4f211

          SHA512

          022261fce3ff261680a75596a88b3c640f15e9108304cd56efb8fcdac0aa6ad3323d120387ab7bcbc4e5df20530290aaf21d38dd29be671279bfbcf310a08f2c

        • /data/data/com.codurqpgk.swtmhmofh/no_backup/androidx.work.workdb

          Filesize

          4KB

          MD5

          f2b4b0190b9f384ca885f0c8c9b14700

          SHA1

          934ff2646757b5b6e7f20f6a0aa76c7f995d9361

          SHA256

          0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

          SHA512

          ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

        • /data/data/com.codurqpgk.swtmhmofh/no_backup/androidx.work.workdb-journal

          Filesize

          512B

          MD5

          5066865464e55df388fda95f13f0112f

          SHA1

          c559a4dee329f1e5f17f818e39ddda68ece4c2aa

          SHA256

          96d1ac853ea913ea42cc4199fa4807b12c17bc143a1373163bcc7bf99106ba97

          SHA512

          1fdf997d5c1855f85d142576101d3b4def59fa93cad3b996bab1ff74372eda99455ec5a4f2086fb04d78384b2fea8cfdd4af6dea3bcf5965e59caba519a70958

        • /data/data/com.codurqpgk.swtmhmofh/no_backup/androidx.work.workdb-shm

          Filesize

          32KB

          MD5

          bb7df04e1b0a2570657527a7e108ae23

          SHA1

          5188431849b4613152fd7bdba6a3ff0a4fd6424b

          SHA256

          c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

          SHA512

          768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

        • /data/data/com.codurqpgk.swtmhmofh/no_backup/androidx.work.workdb-wal

          Filesize

          16KB

          MD5

          9bcf038a1138c4cffb6d4edb430ee272

          SHA1

          3cf666e687e720fdd6f352ed78f1249e4409dbe0

          SHA256

          e577e259e30746080d7a6ec95f78ec4e546b81a8289bceb36ad37c205016dfc3

          SHA512

          06f0ea7b25c5abd9c4a5dbb9d776b09d66b6ac9cd9b2e52cee28f1daef52f609c53238450229649b5c9785dddef6dbaf027a6bfc5ecda4f2b17802b21626a6b9

        • /data/data/com.codurqpgk.swtmhmofh/no_backup/androidx.work.workdb-wal

          Filesize

          108KB

          MD5

          bd98924a821cad646fe5a159e5121213

          SHA1

          4de84541d2703c6dbd996d611170623cfd0ff488

          SHA256

          d71d9936cc51ed2323ea96dc48fc5c38606fc6cee303308f4e7a8cc530bc3bc3

          SHA512

          762b65eb9654e8f4203384da692ffc22615871bfe273bbfe2d5d4f244800e5f1368b4af840650acebae8b513d1879542b806ee195d1e3ffb88b2aced3bb76541

        • /data/data/com.codurqpgk.swtmhmofh/no_backup/androidx.work.workdb-wal

          Filesize

          173KB

          MD5

          aaae14b0d6bf4cdf114fbe3ce34a0416

          SHA1

          de57b106d385f22cf78f4d80f956486e970e0d6b

          SHA256

          662f5571d9de6095296dd4337cc23c7dde36bfb90a4bb5204b26892e01492f61

          SHA512

          611e7d1ec0d3d8617c27936b0ba39d680d1a3a08e5b6d43f0b91c80ba119acd6a6bfe4b4380347b119812709c945d6a47bbbc20b00aee841049d09159a272bc6