Analysis

  • max time kernel
    148s
  • max time network
    160s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    24-11-2024 22:02

General

  • Target

    67373336444cf92861d23ae41b534d2f7ad3722a3fc4a23ef97a5e31d34782d5.apk

  • Size

    4.6MB

  • MD5

    df766b5790e29da663fdfd318395f2aa

  • SHA1

    352727a10de625e12b53259ef363cc8de5181f02

  • SHA256

    67373336444cf92861d23ae41b534d2f7ad3722a3fc4a23ef97a5e31d34782d5

  • SHA512

    e0964d5e8abd06f311358add145bd2e95893d01ac684aed6fc86814135b48044012d86b4fd806fc4ba7f511201a79a789762ea7d106be829cc8532163fca47f7

  • SSDEEP

    98304:CVziM+K+UCY/U4C1NGGEbZKJlD+16zr6ZSEn+mIC3qN6P2GYLlR2MNJl3:OD+Gz4UKkWfmIdNlZQMx3

Malware Config

Extracted

Family

hook

C2

http://185.147.124.250

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Reads information about phone network operator. 1 TTPs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.rxpdnpgga.abhpsrmqg
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4807

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.rxpdnpgga.abhpsrmqg/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    357f0b57c3a6362184605e5bd940e33f

    SHA1

    37d587e78e22756abfcc706019ab1edf3288d47a

    SHA256

    5b7f0bb3f4ec19c8fcfe86f4d81bc21b2e52592d6a4035c7f6e27c96abf51325

    SHA512

    06f46e7940445a34cdef68bc7a105e265a55562022106dcd9debbbafa78e00b57827975f70da7fa4d4522dfc9a5b71e7644304cc519417a7f68dc894090f0ecf

  • /data/data/com.rxpdnpgga.abhpsrmqg/cache/classes.dex

    Filesize

    1.0MB

    MD5

    bdc3c530f389ffe9124c53c8c2c9186b

    SHA1

    9119f877986d2f6c9a589bb782c50885ef56f3bc

    SHA256

    e134703948aa0d722e807d1a5802fc635b821de5794319ce5ef0ea3b28e3d622

    SHA512

    963acec4ececd695ecb607b75d9e12af502aa4cd213d873461b4b1140336bbc2df957a5787e802ae2a15779f90409953a8f268893fb156f027c53d1e6b043b7c

  • /data/data/com.rxpdnpgga.abhpsrmqg/cache/classes.zip

    Filesize

    1.0MB

    MD5

    04b117e0718666eff9c4f90ca9aa70f5

    SHA1

    90a74e83e45aef3910f185676ade0e83fdd6c3a6

    SHA256

    5be978cfefa01aed5a3d0e294866a10990e6399a4f1ff7edb4d0d0efc1a94211

    SHA512

    aa7470dab915b0254dbda03332f9ba5ebd0f6682c27d4736edae5a63588cee4f11206ddffa66673d352098546a5f8677e7cefa2dd7629742bfe3a79c94de9b40

  • /data/data/com.rxpdnpgga.abhpsrmqg/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.rxpdnpgga.abhpsrmqg/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    fbd77e23d5f8e82ed0ba820f4ed016b3

    SHA1

    19935cc2e05dc3e259332807264f4ff30cc0b390

    SHA256

    b22fd50d71e84ccf60f2d3ba8eec14c903297ae424adec48868bb0ed7730ac16

    SHA512

    c0795fa3d7895b0fb3fa0161728ed132c0e89b4d5eb4451a8a829cfd9d15bb36f9e6ff09a8f272b9160af51bd891699c99392765b0f550085634240fdea60d0c

  • /data/data/com.rxpdnpgga.abhpsrmqg/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.rxpdnpgga.abhpsrmqg/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    4d5f6fab7f2a8c98ea8da59e1ef3ea67

    SHA1

    2e99f5b051566866cf9ebad5de4b58a414ba3ac8

    SHA256

    0d8af85e4c4149b7624b28861220c5cc679883fc466c37cf4febe74c2f9a97d4

    SHA512

    e1956ed1ee53346ef9cc0aa70c8dd0210d029dde6e51c8fcc5498e4ac93c9380fd62803c3ad086a94ea2104a773d8b75b8ed10709d5fa047e400fc1ece0c8e1c

  • /data/data/com.rxpdnpgga.abhpsrmqg/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    b760070b0e9d2cb8829a6d17f2ec5066

    SHA1

    e03c8550130a544a9d6b3e1ac7fc24bac3e5a956

    SHA256

    c5d20b2643ea640cb716df120197a51450c8c0ac777bd8ef66b7759e7e422b8c

    SHA512

    d17b2be8deb341aa1193531d1949642c1ea6e892e8e28f6425df5fb585c73b3d282bb9e228795d31dad61f98bac627bb96e2a56bfc20407e7e3436149bba24fe

  • /data/data/com.rxpdnpgga.abhpsrmqg/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    c6d31e00c06b1944868e08d62981a29c

    SHA1

    6792302ab9ecf2115c1e0c9b203f77655775a983

    SHA256

    35c10ef78b246df2753b6628866839dc5c38821b99d86db97dbcb0d06e1cba0f

    SHA512

    a2ec53a35aecbd43d96ff59184638481ba7c29af700c3c9c5fc640e8fe9e4c962e7b5b1759f119efbca96eab2b4ae7b5eac0d5b2e7fb54b484a46e848ece6c1d