Analysis

  • max time kernel
    149s
  • max time network
    160s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    11/11/2024, 22:01

General

  • Target

    6ad2691cec280e4eafff211113adbc063089e30855daa4382e69bf031bc14a83.apk

  • Size

    4.2MB

  • MD5

    0fe3b8a38217d77be4935ffb62cc30f9

  • SHA1

    c193c42204c1f8bd2feac4eacbaf08bf4a6a5a3d

  • SHA256

    6ad2691cec280e4eafff211113adbc063089e30855daa4382e69bf031bc14a83

  • SHA512

    67c21e3db4f93f756c48cedb127f19c4f3f701f0abce20a6a81d338a1d6b2863845ce341623ba42ee3443868cabaf5d45f8cf1325cf19567670672205666859d

  • SSDEEP

    98304:1856qVvPKFINLj+B1l8V3cHzun1/ZkZQo44Eb:u3NR01l85cS1/yGlz

Malware Config

Extracted

Family

hook

C2

http://94.141.120.34

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 22 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.fcghuasqt.cotcrxzol
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4524

Network

        MITRE ATT&CK Mobile v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • /data/data/com.fcghuasqt.cotcrxzol/app_dex/classes.dex

          Filesize

          2.9MB

          MD5

          d5e525a5383d83e0192418408d726e68

          SHA1

          88a20733bf3e31a3cc8115ecf9468a6f7d8c3066

          SHA256

          eb5e87c5bc8954d4ead3b88f1858b4d68d3e0966e632b1c36c9c897f01313161

          SHA512

          db158c02d0e411a80d58ef183d462ff3321b36e7e7ed7da633a281ef3adf671184c74cbd2d15aa6ee3b1592c9d01f2f865be4ecf9f3b0e0a1b3f717084f133b2

        • /data/data/com.fcghuasqt.cotcrxzol/cache/classes.dex

          Filesize

          1.0MB

          MD5

          c56aac70f3062c5f1faf1292964061f0

          SHA1

          d05a25611b3e8b314f719a588720a50825952c6e

          SHA256

          4e9860b0baf238b0b8f225eb3b04f1c8b2052f68f7d23b76b9a0028f6d308789

          SHA512

          f93e4838e586178ac7c579f76d0f26c14f829c6f37cb38d3a63c2e45415dd0d8216497113d37e5ad9ba1026d9d60361f5e7d163588612b9eff8dc990514c29de

        • /data/data/com.fcghuasqt.cotcrxzol/cache/classes.zip

          Filesize

          1.0MB

          MD5

          591e04e6123cd403268deea290ea721d

          SHA1

          3c5497418cbd71546cd8088fc68521f43271858a

          SHA256

          cde626a00e2d305de23d293329279b32a3efac0432197636cdd1eb37a4ee8698

          SHA512

          53aec2f1258edc52c2c139d238505477e902393200001a4e7e3b4d798a75e4b929fd38c002bfac0a85c3524873eae20f86120bc0d49c039cd1c9fc5a9b1653ac

        • /data/data/com.fcghuasqt.cotcrxzol/no_backup/androidx.work.workdb

          Filesize

          4KB

          MD5

          7e858c4054eb00fcddc653a04e5cd1c6

          SHA1

          2e056bf31a8d78df136f02a62afeeca77f4faccf

          SHA256

          9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

          SHA512

          d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

        • /data/data/com.fcghuasqt.cotcrxzol/no_backup/androidx.work.workdb-journal

          Filesize

          512B

          MD5

          0484b487399c6910358bee057d37409d

          SHA1

          0b9b07d8cc3950b9b72b9e9de5901b68d2a3fd45

          SHA256

          17dde38a6adb4c5b8fc0fe3f287bc812742a0402164bcafa695ca84e166bf219

          SHA512

          08804103a2e450db32c79927fbe6264bf25f62a821dd60f842352b6db4d878c938d22d233ef3627a567b34069a9c65e3584152d679a6e8b256510171a5187b0a

        • /data/data/com.fcghuasqt.cotcrxzol/no_backup/androidx.work.workdb-shm

          Filesize

          32KB

          MD5

          bb7df04e1b0a2570657527a7e108ae23

          SHA1

          5188431849b4613152fd7bdba6a3ff0a4fd6424b

          SHA256

          c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

          SHA512

          768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

        • /data/data/com.fcghuasqt.cotcrxzol/no_backup/androidx.work.workdb-wal

          Filesize

          16KB

          MD5

          887c7874699193499a339012ce0a5b2b

          SHA1

          a81c5d637f7b81d5bb73cb936ee28d7e42b36fea

          SHA256

          987923f98ac20cbaa4ec897091c18bfaa9c1bbf0a7e47d8ebb644a08a2491338

          SHA512

          16e0d16bcdf13d08e724c602c795ee4664a40fca44944e37df1fde5802837c14f6d2180d9ae93401763a8db413b948d61a522b1e4c3b928aec181cd62e528af8

        • /data/data/com.fcghuasqt.cotcrxzol/no_backup/androidx.work.workdb-wal

          Filesize

          108KB

          MD5

          abe75148be3c77584b97cfcc82336bbd

          SHA1

          360268eb9b80b3015b921faa532ae5c7ab472855

          SHA256

          f1f4ed7ff65f7f81446bc5b6b79627a88fc13051f0dfa0389f8a46874fd65d84

          SHA512

          a60089d63b8ecff2ade0f687eb810cb07860b77bfae7ad580cfe080aa177f2c73874a23f239fc026186627c354444d45aaf1e475c27ef1a2fc71eb56b94e2257

        • /data/data/com.fcghuasqt.cotcrxzol/no_backup/androidx.work.workdb-wal

          Filesize

          173KB

          MD5

          7ce33c3f49570ca2a0698dc1b3b83730

          SHA1

          7992b2f524fd29282b99b363f383d3d55a716206

          SHA256

          5d28f3ffaa84d01cce11eecf33db05181fb4cd8cb39daca63e361ba0673b96ae

          SHA512

          c4b0888e9f0c0cb6f20e018c19e7bef61bce0b2ae9c0b1e37a3a2b69e3c39c1c4caf7839c6112fe9f2ae3c3b4e763d7f3c1e83893c2f59ffbb644f1397d1b3b0