Analysis
-
max time kernel
145s -
max time network
159s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
07-11-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
f686000f7ddff9b4ef731b226ddb374660963b08a736fe03a55e57471b19ee9b.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
f686000f7ddff9b4ef731b226ddb374660963b08a736fe03a55e57471b19ee9b.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
f686000f7ddff9b4ef731b226ddb374660963b08a736fe03a55e57471b19ee9b.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
f686000f7ddff9b4ef731b226ddb374660963b08a736fe03a55e57471b19ee9b.apk
-
Size
4.6MB
-
MD5
65fb2f32a25169a03c4692f69212340c
-
SHA1
58d5132a9728fdefa61556e11b637f85f3e7a650
-
SHA256
f686000f7ddff9b4ef731b226ddb374660963b08a736fe03a55e57471b19ee9b
-
SHA512
3b8dfb7bdd91deba5e059405602cf4f0faf8c65507e150508b940c6d5fb7945cbbb58d99bf6a94fe4a6032ccc7ab3da2c943f0fd063d643d02fe71911544c8ca
-
SSDEEP
98304:Ilyc0viX5Pahf5TWQCLZE7yUI6nNjCpCdH4v4ZCaKIbrzgr:IlycaoMBaQCFE7yUI6nNmCp4v4ZCSbrm
Malware Config
Extracted
hook
http://89.248.201.43
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.codurqpgk.swtmhmofhioc pid process /data/user/0/com.codurqpgk.swtmhmofh/app_dex/classes.dex 4475 com.codurqpgk.swtmhmofh /data/user/0/com.codurqpgk.swtmhmofh/app_dex/classes.dex 4475 com.codurqpgk.swtmhmofh -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.codurqpgk.swtmhmofhdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.codurqpgk.swtmhmofh Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.codurqpgk.swtmhmofh Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.codurqpgk.swtmhmofh -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.codurqpgk.swtmhmofhdescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.codurqpgk.swtmhmofh -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.codurqpgk.swtmhmofhdescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.codurqpgk.swtmhmofh -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.codurqpgk.swtmhmofhdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.codurqpgk.swtmhmofh -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.codurqpgk.swtmhmofhdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.codurqpgk.swtmhmofh -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.codurqpgk.swtmhmofhioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.codurqpgk.swtmhmofh android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.codurqpgk.swtmhmofh android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.codurqpgk.swtmhmofh android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.codurqpgk.swtmhmofh android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.codurqpgk.swtmhmofh -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.codurqpgk.swtmhmofhdescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.codurqpgk.swtmhmofh -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.codurqpgk.swtmhmofhdescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.codurqpgk.swtmhmofh -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.codurqpgk.swtmhmofhdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.codurqpgk.swtmhmofh -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.codurqpgk.swtmhmofhdescription ioc process File opened for read /proc/cpuinfo com.codurqpgk.swtmhmofh -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.codurqpgk.swtmhmofhdescription ioc process File opened for read /proc/meminfo com.codurqpgk.swtmhmofh
Processes
-
com.codurqpgk.swtmhmofh1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4475
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD558a128117231098ae3b9d50a5d27e1e3
SHA14b1ef36362e4fe38db6990ee84fd545eb62b0d6b
SHA256e4c872ddb8fc8934e8297db9e83d0983a036b8602824e8ab8353b76548ba0420
SHA512e3abb45e04e482157d4e40c6dcf9a3da1b91f4998d1627f96c08ec9e435867f5e9ba28ce8a121c29abcdeb2668ac599e04c9a9e5415c6590ed45a0de453c4576
-
Filesize
1.0MB
MD5933f265e9c9604ffd2488da40d4c4915
SHA110dbe95819a83f4ae13efa4fbbe8bdcabd973ad3
SHA256b3018cb63c1de103755d3cd2b8b14c0dacc8771153681754eecb8a3d68920a52
SHA512ca41f2c1d771cdcaba9ad33ced3edcb1aec23cc15f6fbe521b5b966787866d6e88202790d05db3538771277028751341f84350d0f923acc270a3320c70373d78
-
Filesize
1.0MB
MD5926c734646a65c874648c08cb4f3ba2e
SHA17b0fd2ed4fd3011ed07ba4eca632c4560eb2409c
SHA2566a92c42ccd5757f03b04f0c28ebfd9bacdcab77089e9ebff54c686d4d8c4f211
SHA512022261fce3ff261680a75596a88b3c640f15e9108304cd56efb8fcdac0aa6ad3323d120387ab7bcbc4e5df20530290aaf21d38dd29be671279bfbcf310a08f2c
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD50b2234c656fb38948aadf68b5c296dd1
SHA140e3ed011adaba92d84b9088cde802fcd9d372fd
SHA2565ac729c29e6ecddff3b64c7a24046f754dbb613a75f4322728627e775795c299
SHA5128c2f5697b1a129cc90297152cc90adfef4cc83b02c61bbee15424ed6f087127dfb7b8b2e1efcfd8b7e54fe51765f3f73568e17cdc9f9a1538cf39ac51910884c
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5f350f2521bd2cbb6536bfd6619f76285
SHA13b5fbb9ff7cf59607c741bd1e9cc2ac5587474a2
SHA25613820a38d3fe72eaec575175c6f991d4f03e6fe23722ff0d3047938a8a14fc2c
SHA5128ba69a852f2bf46454cc09fdd49ac7dacd1f0aba5457ce09ef4e765f6f8c04c0c0a923f1a0086cbdf8bc53182d1e55bb4d4b6fa281fcf065b21ca0c53b4ebf79
-
Filesize
108KB
MD5b187fc2085b0b24fa6a00bab62142795
SHA1e4ade5e008cd9a24de6a1afc7d2f071f6dbd05c1
SHA25652c38a1691aea4e7c064c586d4392a93c8f064726152bda9e8cc9aeb9c82d04d
SHA5120f22d2abaa4bfeee82a70c682c0c112a6fb08dd21ea691c3a9922ff76c0b8795880934780c90b33edc1304b1196785a8693036aad4739e1463dfeb0cf3e3e77a
-
Filesize
173KB
MD5cfcaa3f1da6818b999dbc3c2d4f294ea
SHA1c2ab92f39680047cbd8d1e036554d2b72ed81201
SHA256892dc0556ba052c6897c684751bfda2ab6e69096a46799ddef5c02a1712cd213
SHA512fec622039928d53aa8bcbc4eee6378fd9ae1cf1fa26a4fd4f289f0094c1180dad32938954efd1248ad76d07c60e056a86fe8ad1307dbb264a42ce114e76472b6