Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    06-12-2024 22:09

General

  • Target

    3de88fcda6bbb1a8cf75eea3707ec9193b0fe4ddb374416f2c96339d01060f88.apk

  • Size

    4.6MB

  • MD5

    8957452fc92e6d690ac6a34210291176

  • SHA1

    9f99dca60497252c0f62e186a86095900f29601b

  • SHA256

    3de88fcda6bbb1a8cf75eea3707ec9193b0fe4ddb374416f2c96339d01060f88

  • SHA512

    f0859cecdd504b504cb731fbc8aaaa9151d2e8dfcffe531f4a43e4f5ea7a6f70c06af8beba29fa0a4d2c8e4ee2a8c1f827a733508d3f2d225637ee7b1b615307

  • SSDEEP

    98304:lQEWIqBHq1ilayGbwuiPo35djpI3IxY2Bu9103gLTgrS:NWa3RbNp9e2Bu9+36cS

Malware Config

Extracted

Family

hook

C2

http://154.216.19.93

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Reads information about phone network operator. 1 TTPs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.hzljikjfv.kdjbyjhjv
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4734

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.hzljikjfv.kdjbyjhjv/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    ed14af8b8ba5743b4fd30e59711aaa07

    SHA1

    aa87fc75c04cb3def8ef553a0e830b99178ae918

    SHA256

    ce042cad56e916a027ca6497209262094150685f77e9c348e983f1bbcac59512

    SHA512

    4f81587e7140098b0d6e6861c1a344b6c5085bf3d6dda3daffec7b6755d98c12ee1a69e2b7ae647a71adb4a6cf0e968adaa058dfbe2a35e625861f4b2b6faf1b

  • /data/data/com.hzljikjfv.kdjbyjhjv/cache/classes.dex

    Filesize

    1.0MB

    MD5

    22974556ec49f63c08c5c74d95849d8b

    SHA1

    8325b0d31662476920cdbc26dee22bea6b7bb993

    SHA256

    fe4454a4addc793af6e9b607852cc2da199b1dc03d4be21bc8ab7e2e113bea73

    SHA512

    d13a510aee6395c7b936ac7385748385ae67d722a4e4110545dffd27b60d5b8fa7dc1f51e61e6832f2f77ac1abaa77cb42f1f4985656392c0dab3727d99d8626

  • /data/data/com.hzljikjfv.kdjbyjhjv/cache/classes.zip

    Filesize

    1.0MB

    MD5

    2aa3fec8d84197e2a7b85dadb56b6e74

    SHA1

    5edbd30497824afb33cbdf330b6e03cfe47e2ad5

    SHA256

    2690839d69a166db73c1a06852fc5bc7f6df25e710c3a50c4f8b1fce3b0c91fb

    SHA512

    69c23d27070a66268e10355f959b52b8476c17eb4b853abe2a75e7813fb0ea205b5baef7cac909a03c7c1ae22885fafbd42b8b0c5ef7ad2b7c7e55ad53efebd8

  • /data/data/com.hzljikjfv.kdjbyjhjv/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.hzljikjfv.kdjbyjhjv/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    a715efc9a6727eb0d5950afe8625d532

    SHA1

    e9be658b3ba7e49b08c04339e5c4f2043f3bf1ab

    SHA256

    1079fc477cc80398d94008ae37f6a84dc12bba23a6cb5f989d6081a58b2adc7b

    SHA512

    960fbc2f299bf67c1c171d82e80cdd4230d96fc143958ae4e91a99b1f05ebffa230c97aae9c493fd11a87b7a5e013938f62ed7bccdaf1175c02087f136334b7c

  • /data/data/com.hzljikjfv.kdjbyjhjv/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.hzljikjfv.kdjbyjhjv/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    5e6bf8aa8bb1c19b67613cd39d4c4681

    SHA1

    101eec00fce03b43da4d9a5262abb42e75e2e0fb

    SHA256

    196787c87e0efd963279df8bb3a287b55e93fb26da831d03177ad5017e525239

    SHA512

    75ad85c2340bc42f80f7a16974b749128a06ec18b2a781b384bfcbd04b425e03551cbfd7734f3553c8b9e28fca9f6b6c6e9ca8f03864855ad7ecafe7a64bb4db

  • /data/data/com.hzljikjfv.kdjbyjhjv/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    f8ce20b79f07390d890aba2d347bc6f6

    SHA1

    1a6a5fa07e310908918aa01d3fbcbb8d73d9614e

    SHA256

    a4e34788e7db3e4fd70d70c36d83ae49d19b70cd1644b432234835ded0bd5b8d

    SHA512

    2cf3dbb43be4e439c501d864df23dad4f2023cb0b1b8198c707107999bdc77cb6566cbab5fcb76fb7efa36b075d68b05870f1decb2a5c6078370f32a5104f7e5

  • /data/data/com.hzljikjfv.kdjbyjhjv/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    ab9714767cc153cf00344ef728eb7342

    SHA1

    bc14e40fec831b6631ec90e988ad2e6482f3fad2

    SHA256

    fbd69b87ce53c5937ff599199641bcd736a8c94b7c96fbdf7f642b16a2436c5b

    SHA512

    c4718f96cc3f44b1e1c0b7fc1c283453288201c0dd632d267c45689c42738b5d9cdf57e6eccf7c244b7da016aff7284a000190e91556d9648284b7e6fc48dc00