Analysis

  • max time kernel
    129s
  • max time network
    160s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    04-12-2024 22:12

General

  • Target

    4b9df9cf6c17ffce15b2a46cf0ac6b2435335f23d34674e5a2e6973d0f0a3744.apk

  • Size

    4.6MB

  • MD5

    86d46ede8ce318e94d8c226403296010

  • SHA1

    6dacbc12a42071a77258fc0977a741bff4050ff6

  • SHA256

    4b9df9cf6c17ffce15b2a46cf0ac6b2435335f23d34674e5a2e6973d0f0a3744

  • SHA512

    f92f167f24b748e56eff4903843b5783345e21bd480341d2168515706b513745e5abe4385f3f02bf23b21b2dc44dafb55140d075e3bf3efa85d81cbfde148464

  • SSDEEP

    98304:8r6z7yRHjrLb+luycRm2bvNe9e2WBtmGHYmQm4HDatb6g6TVUnp:y6fCDrPZm2bVyIBQ65YDA3N

Malware Config

Extracted

Family

hook

C2

http://92.255.57.103

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Reads information about phone network operator. 1 TTPs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.dmhgdwaby.ehntehrvj
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4469

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.dmhgdwaby.ehntehrvj/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    46d88f78c226edf8c145b4f299acf3a4

    SHA1

    3b203554bcc21fa9e3a745c6f31dd96c3bd21571

    SHA256

    1d9ee88692ea9918e89ac16b73a7e93c0b31ae283865f8cfcdfd143777a012d3

    SHA512

    b443f27d2a4159e3829e2520136653a88c160b9c057d6d591b03b1e34da90b5cfccf55cc2ea3f2dd76cc55901a47b77917c9e380e169fa0f07969c136e376d9e

  • /data/data/com.dmhgdwaby.ehntehrvj/cache/classes.dex

    Filesize

    1.0MB

    MD5

    de687b18b199c2d7903e8dc44a21dfcf

    SHA1

    279b5d0816ead79e02f7fe8695eb90c393d02db6

    SHA256

    e3cb3c5fc4747a32e745b7e22ddf49bf3b3e0b6e51b6fcc4572411850caa73b1

    SHA512

    075e720ec29a4d08f26f606e81a2f25ef860c09cb6bb0eb02bbadefa016da34f6588391030a77ceb9e1b3e15275a1c1d2f4bb2daf04e3119a6c1d6e88276f0a8

  • /data/data/com.dmhgdwaby.ehntehrvj/cache/classes.zip

    Filesize

    1.0MB

    MD5

    a220a685cf885ccb4f74783daeac89a6

    SHA1

    d8ec9b5abfd1250a1f138e7dc8285f538f641acd

    SHA256

    ad45c5fd419826fbe7a2d1ddf96a8d8e6eaf6723facf66f0f543620c9e9fdaf2

    SHA512

    2110a7f76daeab5b28429057436886336c8d5b785b89f753fc0ea433b9d647789ab9960c1fbf7a8c50a6507fac66bff6d1c09d750787106cbd1577120f840dca

  • /data/data/com.dmhgdwaby.ehntehrvj/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.dmhgdwaby.ehntehrvj/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    fa8b9199d28b9d83bb279867671e00db

    SHA1

    0c90100f5799fe38fc63609938cf8fbaa1a15591

    SHA256

    ab134dec6f71eeefae96d2adf9b7763a78b1c917a789748a635156bdcc6f7e87

    SHA512

    f9276895a43dca7ae5d19018d3df3b0a881b6530106acf2cff529a5f485b8fc826738ea03b0f8bbc8af76683dc3527b9afdb5909c2fab2d6f059b64f4c4683dc

  • /data/data/com.dmhgdwaby.ehntehrvj/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.dmhgdwaby.ehntehrvj/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    b42c8909f14f91aefdb73bac3cdc2ee5

    SHA1

    325f9304b5cf1ad5de87d9ee8736ef1ebd0145f2

    SHA256

    92ce1ea39a059d6aa85eeca59b4efe90f2462d1efe3368c25e88e96b061d1079

    SHA512

    97da999cbcf179422bfc42460fead105c045c8044faed215d0553eb7950be9bed18210e4fb26abb114d10ed8e41e6f7ad545359a248670bf631683ff350fc6b4

  • /data/data/com.dmhgdwaby.ehntehrvj/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    17dabce02b707f588a91d9f8c72a2466

    SHA1

    c23098fe512bde482d1c5f8f1e73fa0a27d8a60b

    SHA256

    e3a941b47f3bad983c5fe51bb6d3c243cd9bc0a6e93a73e901cd0ef2c008b401

    SHA512

    cc14338a0ccc06f60d4c6beadc5737f42368154a841624209af6c812c6915b4acd677652c08da4404e4101658521439686e56a4a130d9055b78e4a3d5c259a1d

  • /data/data/com.dmhgdwaby.ehntehrvj/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    2b16ac78c127921050f478c1db6a1c93

    SHA1

    d0fe294e8aa888e38324bb10d0d434ace75391a3

    SHA256

    e8d0fa97846d1a92de9c4dccc65d9ea06f28b372c422e5bb7f0cc15d76664fca

    SHA512

    0f2a0e21111409184138783e051095f0e597ea133a6cbc7f08d459d4a13d6d96acdb60b57717ef68fc9c7346649f86dec3c7c920a916afb4b4c88db04b838e1c