Analysis

  • max time kernel
    145s
  • max time network
    159s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    07-11-2024 22:03

General

  • Target

    f686000f7ddff9b4ef731b226ddb374660963b08a736fe03a55e57471b19ee9b.apk

  • Size

    4.6MB

  • MD5

    65fb2f32a25169a03c4692f69212340c

  • SHA1

    58d5132a9728fdefa61556e11b637f85f3e7a650

  • SHA256

    f686000f7ddff9b4ef731b226ddb374660963b08a736fe03a55e57471b19ee9b

  • SHA512

    3b8dfb7bdd91deba5e059405602cf4f0faf8c65507e150508b940c6d5fb7945cbbb58d99bf6a94fe4a6032ccc7ab3da2c943f0fd063d643d02fe71911544c8ca

  • SSDEEP

    98304:Ilyc0viX5Pahf5TWQCLZE7yUI6nNjCpCdH4v4ZCaKIbrzgr:IlycaoMBaQCFE7yUI6nNmCp4v4ZCSbrm

Malware Config

Extracted

Family

hook

C2

http://89.248.201.43

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Reads information about phone network operator. 1 TTPs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.codurqpgk.swtmhmofh
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4475

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.codurqpgk.swtmhmofh/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    58a128117231098ae3b9d50a5d27e1e3

    SHA1

    4b1ef36362e4fe38db6990ee84fd545eb62b0d6b

    SHA256

    e4c872ddb8fc8934e8297db9e83d0983a036b8602824e8ab8353b76548ba0420

    SHA512

    e3abb45e04e482157d4e40c6dcf9a3da1b91f4998d1627f96c08ec9e435867f5e9ba28ce8a121c29abcdeb2668ac599e04c9a9e5415c6590ed45a0de453c4576

  • /data/data/com.codurqpgk.swtmhmofh/cache/classes.dex

    Filesize

    1.0MB

    MD5

    933f265e9c9604ffd2488da40d4c4915

    SHA1

    10dbe95819a83f4ae13efa4fbbe8bdcabd973ad3

    SHA256

    b3018cb63c1de103755d3cd2b8b14c0dacc8771153681754eecb8a3d68920a52

    SHA512

    ca41f2c1d771cdcaba9ad33ced3edcb1aec23cc15f6fbe521b5b966787866d6e88202790d05db3538771277028751341f84350d0f923acc270a3320c70373d78

  • /data/data/com.codurqpgk.swtmhmofh/cache/classes.zip

    Filesize

    1.0MB

    MD5

    926c734646a65c874648c08cb4f3ba2e

    SHA1

    7b0fd2ed4fd3011ed07ba4eca632c4560eb2409c

    SHA256

    6a92c42ccd5757f03b04f0c28ebfd9bacdcab77089e9ebff54c686d4d8c4f211

    SHA512

    022261fce3ff261680a75596a88b3c640f15e9108304cd56efb8fcdac0aa6ad3323d120387ab7bcbc4e5df20530290aaf21d38dd29be671279bfbcf310a08f2c

  • /data/data/com.codurqpgk.swtmhmofh/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.codurqpgk.swtmhmofh/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    0b2234c656fb38948aadf68b5c296dd1

    SHA1

    40e3ed011adaba92d84b9088cde802fcd9d372fd

    SHA256

    5ac729c29e6ecddff3b64c7a24046f754dbb613a75f4322728627e775795c299

    SHA512

    8c2f5697b1a129cc90297152cc90adfef4cc83b02c61bbee15424ed6f087127dfb7b8b2e1efcfd8b7e54fe51765f3f73568e17cdc9f9a1538cf39ac51910884c

  • /data/data/com.codurqpgk.swtmhmofh/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.codurqpgk.swtmhmofh/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    f350f2521bd2cbb6536bfd6619f76285

    SHA1

    3b5fbb9ff7cf59607c741bd1e9cc2ac5587474a2

    SHA256

    13820a38d3fe72eaec575175c6f991d4f03e6fe23722ff0d3047938a8a14fc2c

    SHA512

    8ba69a852f2bf46454cc09fdd49ac7dacd1f0aba5457ce09ef4e765f6f8c04c0c0a923f1a0086cbdf8bc53182d1e55bb4d4b6fa281fcf065b21ca0c53b4ebf79

  • /data/data/com.codurqpgk.swtmhmofh/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    b187fc2085b0b24fa6a00bab62142795

    SHA1

    e4ade5e008cd9a24de6a1afc7d2f071f6dbd05c1

    SHA256

    52c38a1691aea4e7c064c586d4392a93c8f064726152bda9e8cc9aeb9c82d04d

    SHA512

    0f22d2abaa4bfeee82a70c682c0c112a6fb08dd21ea691c3a9922ff76c0b8795880934780c90b33edc1304b1196785a8693036aad4739e1463dfeb0cf3e3e77a

  • /data/data/com.codurqpgk.swtmhmofh/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    cfcaa3f1da6818b999dbc3c2d4f294ea

    SHA1

    c2ab92f39680047cbd8d1e036554d2b72ed81201

    SHA256

    892dc0556ba052c6897c684751bfda2ab6e69096a46799ddef5c02a1712cd213

    SHA512

    fec622039928d53aa8bcbc4eee6378fd9ae1cf1fa26a4fd4f289f0094c1180dad32938954efd1248ad76d07c60e056a86fe8ad1307dbb264a42ce114e76472b6