Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    android-10_x64
  • resource
    android-x64-20240910-en
  • resource tags

    arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system
  • submitted
    11-11-2024 22:02

General

  • Target

    35dc83b868ede705f2095db3bb162d07d452fb54b34881613e2eeda988a175ac.apk

  • Size

    4.2MB

  • MD5

    d747554f5c988cfd287aa604e9522557

  • SHA1

    9f7db7025e897288e1b50951ba0a94afb4ebac5a

  • SHA256

    35dc83b868ede705f2095db3bb162d07d452fb54b34881613e2eeda988a175ac

  • SHA512

    84fe8acdef749427cb50292dce6b49b3f93a3195e88fe98ff2d37e2664a26eeb66cdfb9ddd5ac843956d94c38191a398ac48f6a24f18ec74ae6a06fe05ac288c

  • SSDEEP

    98304:zYQ1H4bS8Dd1eojQhDxDKCCY/SresT8qWGpOVXMGnDa+xFE25:cQGbBd1eo+8JSSresT8kum+J5

Malware Config

Extracted

Family

hook

C2

http://94.141.120.170

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.rhdjqosmq.fgclvszcs
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:5110

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.rhdjqosmq.fgclvszcs/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    ae49661c19512148f67f24ad37a69082

    SHA1

    d1f6ea727f651ff74cc8b4a2b2382778c343c1e3

    SHA256

    b829b24787b06dad1cc66f00f33401ba4a465e33d61421768248895f50521eee

    SHA512

    955d915503f43754701c76ebf4e1c1a2d2fb4e7f84b3a53634f155245b48810cb6d951c4a27505e5b7121296c3807aab553450a478ac9f63f7061577562d067c

  • /data/data/com.rhdjqosmq.fgclvszcs/cache/classes.dex

    Filesize

    1.0MB

    MD5

    cca51404679594decb0ec5566926acaa

    SHA1

    94fc646b1047f3600a052f8c9fccae9bd1281328

    SHA256

    e1db066416428fd12ec1a0e321983b1188986664ede9e9da1026d28efae9c2e1

    SHA512

    ee286a72ae8661e4b759be6a9fb234017376866e38da15acdfb57f4c334bfa951bb433657921eb72f2c116e80df435559c4bbd4c8e36261e5d25d6b2ac99d8bf

  • /data/data/com.rhdjqosmq.fgclvszcs/cache/classes.zip

    Filesize

    1.0MB

    MD5

    0cfb10c2a0d208fa6b97f8353ce971fa

    SHA1

    cc527ad24dd6ebdc9ed367d0e9634da47fc99723

    SHA256

    be106a291296756b977b04cb550a0dc85c7475249ed303c6da4977928411f47a

    SHA512

    11d5dfcf0ff0e17c773195ae0202c8764d9d1be101511a86b21b24f097060fff3249b856c1ad76e6e8383337e7d32245fc7def8b7799e132c8fbfc0446eafbd1

  • /data/data/com.rhdjqosmq.fgclvszcs/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.rhdjqosmq.fgclvszcs/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    bd7ea1bc9bcb5ad9c46d7fc402380a35

    SHA1

    88effdc97f6ef545e1df21c071648d3b905649e0

    SHA256

    f2203bb98cae5f59f9730aa16ecfd3ae021271f9a1f4ea3af030a0c17fa7bcc2

    SHA512

    1e3ec9e4c4b9e9706dd7154d8d760d17210c9463b248a5e94987d0c35dd50bcbc214054d559be22fc3611cf510689f5e1166a98ee17b3c129c7ab3815122ae96

  • /data/data/com.rhdjqosmq.fgclvszcs/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.rhdjqosmq.fgclvszcs/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    418723de202d3a458a953b116d59ab7f

    SHA1

    517a06e9c91a14a5c168e5a0dd605bed2202737f

    SHA256

    8abc4ef2643d8e29c606d1eee143b0a390b703881b2b7cdcca0d2602f94ff573

    SHA512

    248666f5546c6913e3835913e5a44a15e9566c258d4b80c319f43ae28448459e5aa1db432b14aebb75b60006f42c58f32eed9224a74b085fde6a5fd354a2e095

  • /data/data/com.rhdjqosmq.fgclvszcs/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    cbff5c02ec2a75784197758160965ddd

    SHA1

    5993e4b87c20967ccc3cc8e906345f5edbfe3e38

    SHA256

    bb8e5e72ab708e75ea0f4850880a7784e5cb0158fa217d7bf04ed0df9cf2ece2

    SHA512

    34d1335673b7c9460f14019697468972625aa6f86a522f19bfe6a0f7e0338cc67d6faaeb66f8a5237e0355762f5356580236776048b318472dda22763021d901

  • /data/data/com.rhdjqosmq.fgclvszcs/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    d13bb7c7badb3298c7f1020dadd433d6

    SHA1

    9929e2c5b9cceda377fdd5caf2b012a24a7c646a

    SHA256

    5c5915131f02c7317bbcfe8079dd1ed9c6fbe3de3d955cf8b12fad4e8726e865

    SHA512

    40196eec69c087656faae2d90d1abf8eac217f568fdd1c2382f1138df8076cce403812302a178c31d5b0499be661bd8c9ec221cd292ed2e58cb245141b74f62c