Analysis

  • max time kernel
    131s
  • max time network
    162s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    24-11-2024 22:01

General

  • Target

    8dc420efd61e175140c215fb0f514c728312a1db2f2be48438ed1fe8a81eef0e.apk

  • Size

    4.6MB

  • MD5

    4e124742f97c21743f4eab69ea4fe27e

  • SHA1

    caefae5c6e217169fe683bcc1e61b582620b7b04

  • SHA256

    8dc420efd61e175140c215fb0f514c728312a1db2f2be48438ed1fe8a81eef0e

  • SHA512

    c3af9b30d06b02028ff6212c4b59ea30f8abb5dc13848ec9660f74a2e8003b1244f5cf0d384949ef36c074d995d8ffe1aa9b3e9d80863130d07eb47ba95c9878

  • SSDEEP

    98304:xgO1xEQCdw0PoqzbP9oWx8qfKUfuwcpGYObG0JI0Jw:hiQCdwwoAP9rxdiUhyObw

Malware Config

Extracted

Family

hook

C2

http://154.216.17.184

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.muzeauuvq.consstfgr
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4455

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.muzeauuvq.consstfgr/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    91945e8e9424b112b54c0b7d096e8140

    SHA1

    2a682040772ea08ee1cdaeadfa11d082c5e814a9

    SHA256

    65a4cb850f8259ccdd53097a96d12d6f21a63361fd4260e08740e57bebbc5a7f

    SHA512

    d0cd2e8c60bde9ae1251feece71d01dd02b640ee3331def50dadb82fe01eaf6eb29e99a4b8ebbf65378ad0f8e2ed6e0260e12a7994c7979ae77883d6989f5fb1

  • /data/data/com.muzeauuvq.consstfgr/cache/classes.dex

    Filesize

    1.0MB

    MD5

    f227ac280380931d865e58cbfdc15752

    SHA1

    0bdffd65f16503727fcb0b678392150e2867ff66

    SHA256

    4a172f9862f44cee2068bbf6106aad4fec4b4d33327ad52a785a0e45de47f9ef

    SHA512

    45d328fe58bdaa47cfb260920d18278296b1741874461ff42d67a16ee1871dd113a2d6173c95bae0491d098a1a0d45700cf82d9d7f7d0498071e98d9cfc5e333

  • /data/data/com.muzeauuvq.consstfgr/cache/classes.zip

    Filesize

    1.0MB

    MD5

    b003a2054e04d4cd3d0873dec66e4ec1

    SHA1

    2fce0eeee50bf02419aa57864cf67233e9ea5f8a

    SHA256

    fd7e64679ceefb7bb4e9c8b08d9997892b516ca6b2698f0f183965f946577443

    SHA512

    8e59945ccc15eb660dd0617d2dde7d06e073c07486c0e5ac5bc9d038780ef9f68cea3cc11c4f24ae7d0efd2159e6a40d677129960b8ecc7d34cb537d41217487

  • /data/data/com.muzeauuvq.consstfgr/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.muzeauuvq.consstfgr/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    3aec06585fa534a5c09aaa0cd48ea8dd

    SHA1

    92ee0705d204f82b512f469f72d09b86ff1148a5

    SHA256

    96dcabe0d6ffa0ca336a6f66538af26836d1a00a11814b75c5b9a9bf1b631bac

    SHA512

    f3dba8910b9c0dd12fe0f6d49a216771d5fc47036162ef3f99923497ba0b120a9ddaa3d531195c06fa823e1c8fffd6c4fd1a2129f5eb2fea5adc584414a0a39c

  • /data/data/com.muzeauuvq.consstfgr/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.muzeauuvq.consstfgr/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    239e8a78704ad72977651a1c613933c0

    SHA1

    d91d8a6d0babd505ed24d4834290547d5a658674

    SHA256

    40e23066cf988d289fbedd9c6727b4992625161f6e2daef961447b36fe996494

    SHA512

    a4dcd63b47f1db911a54a955d670ad5fa4c10c65251ebc520b4a43f18a94da20745c16bf8c0998df4fbabe64cb662ca3c243283a7aa4558894f29aff6278f394

  • /data/data/com.muzeauuvq.consstfgr/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    54eaa0f33926ccbf5e143db428b6a067

    SHA1

    54e080b83667f005549dffa3af76c6515c198dbe

    SHA256

    f760072bc0ddf58d41e54be339044a877367f54499609c7402c6c744c2cd6fe3

    SHA512

    310e5e14c44e15b470a40d35a875f2f214592d9a89ad19a0d49736ea3df99195112a73dcc64a47570131dda0d685e8bc75c890fc7cd8af58cd17dda1bc29fcd7

  • /data/data/com.muzeauuvq.consstfgr/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    b317480d930df23376e801b020f94908

    SHA1

    fd07a1f27ac80ebb0c6e83a21da7a567b4664af9

    SHA256

    613d1800d82087e28c9f4aac6fbca1e374e23823495fff3dc0301503b81f1ccd

    SHA512

    b52ab80040615e5459342306cf5ad05ca68a7be5d426c7b2fbe8465fc45b8c2e88786c9123cca76c1220568bfebf95c53fb0d217a430b796065dd07aa120765a