Analysis
-
max time kernel
149s -
max time network
159s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
submitted
14-12-2024 12:43
Static task
static1
Behavioral task
behavioral1
Sample
com.ygkaxidkh.ffldaorgq.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
com.ygkaxidkh.ffldaorgq.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
com.ygkaxidkh.ffldaorgq.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
com.ygkaxidkh.ffldaorgq.apk
-
Size
4.5MB
-
MD5
2822ee6f2c62e0d59e3a6e3b49936bff
-
SHA1
fa1d9b7d1ea36004c5de7b7e5dbf4e59d6993881
-
SHA256
2da377529967c57cf738206ad5a1414485658daf7c26e66a6c474b165442f1b6
-
SHA512
00f39e5ec2bc113c8e6e23d1dba2b41fcba84788a6729592451e9c635cc9d36e2bfa0c6d68531fa82d81d4549a17a56355961a2bdd9bcf30f4c0fd7cd7fd4443
-
SSDEEP
98304:19HLjEpXQoLXV4W0WiWmOC3POywZLRnKhbLJaojI+lnLwTNSM1eR:7cXDXeKyyJobLJjrlLwTYM1m
Malware Config
Extracted
hook
http://rocketstylebuildinftoday.online
http://rocketstylebuildinftoday.xyz
http://rocketstylebuildinftoday.icu
http://rocketstylebuildinftoday.live
http://rocketstylebuildinftoday.shop
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.ygkaxidkh.ffldaorgq/app_dex/classes.dex 4627 com.ygkaxidkh.ffldaorgq /data/user/0/com.ygkaxidkh.ffldaorgq/app_dex/classes.dex 4627 com.ygkaxidkh.ffldaorgq -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.ygkaxidkh.ffldaorgq Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.ygkaxidkh.ffldaorgq Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.ygkaxidkh.ffldaorgq -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.ygkaxidkh.ffldaorgq -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.ygkaxidkh.ffldaorgq -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.ygkaxidkh.ffldaorgq -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.ygkaxidkh.ffldaorgq -
Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ygkaxidkh.ffldaorgq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ygkaxidkh.ffldaorgq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ygkaxidkh.ffldaorgq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ygkaxidkh.ffldaorgq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ygkaxidkh.ffldaorgq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ygkaxidkh.ffldaorgq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ygkaxidkh.ffldaorgq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ygkaxidkh.ffldaorgq -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.ygkaxidkh.ffldaorgq -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.ygkaxidkh.ffldaorgq -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.ygkaxidkh.ffldaorgq -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.ygkaxidkh.ffldaorgq -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.ygkaxidkh.ffldaorgq -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.ygkaxidkh.ffldaorgq -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.ygkaxidkh.ffldaorgq
Processes
-
com.ygkaxidkh.ffldaorgq1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4627
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD544723267c98402b080805eaac5c75a44
SHA17be7566788529318eeee233078e881f7616ca414
SHA2564a22f11437441381266c2fd88b640502a3ee25415983a16c8eab1eab326fa272
SHA512da8ac124a46d08eb8bb88eedc1f83e586c93c8ffeab07467260d07429cafb8b0b4a42e068e2c6170d6f252116866e8048e4920ceeee9c032ac751cf1d720c9ae
-
Filesize
981KB
MD55ea9b6336fb131fdae456fb6601d2eae
SHA11f6478804f427703db8fce112b02ecaf8d64499c
SHA25662aaeb31eeaaef03a9c60c2b97d3190baadba125919e337fe1dd6a75432d6e9a
SHA5121bf6daa3ac921f86ae75505963e3d4dc9ea312ddccdb5caf0dc4b9965d449263d1f84cbbc68397d362a71ed931b7fda8360d5afd1271b1b26e782dadf1dfa5fc
-
Filesize
981KB
MD58d6918c1f9765d4336e429c8841de7bc
SHA1a66e74297ba0f5ab1a9c8be19b2f112660336b77
SHA2565573a9c320c20a51fb4431999efd0b937b3ea8daa1c98c4b21be87f71a2a9a31
SHA512bdd2a3376f6b4626ebaab50f61da77e6881e1f1548afb4c7e49bd8dad475b8b9675ffe9d3182a66e05ad7bad0e198950983a50434ad2d0e7d591c3a51b4b2897
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD5d8b999c7ed88671e968db52a3c6972ee
SHA1bb8bb6bdff5e68f92c871433f6f58940e377dcfa
SHA2567721fcda53e81b9d5adb1830808406bd4e75a6c41e959a37b5c05f98334064e8
SHA5124cb286edaa08d9e6072a5fc658571db72d04823ade67889171b800d7d5ae3c0da9af8d5ed1db142723a49da89e3070585bf6874154a563f36649cf45023feaf8
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD58852528686ac36dd64eb484782341bbe
SHA1d91f092a6e2925d883ea00fa7ceac133d9c16fef
SHA256e9fc81bb0267f82e988cb274747b41f348ed5a2990c7108b96e5738f36b53cee
SHA51208d160ba6314813da37c91fb3e494c853001b4ffdec55008ae0516da637b73a2be1d3a64572025edd36c31d28fb5cfe9fb502b9817c4ee632a10f75f3df5fbe5
-
Filesize
108KB
MD58e4aa4d244e9abeff0c7eaebc5bd2444
SHA1b26e4734e46bfde5b3fa43892e556367a76df053
SHA25618ab3f14d954e39d9444311ca2d2bf68c888041705264ca68149a7e5e8a985ea
SHA5127ae40d675c22daa0f52786eebc9b1cb851f8231364fd1369d97da0622f6e6c2381887d87ebbca4da85afb8198b2ddc159bd5cde24b62e16560c97b12c931e7be
-
Filesize
173KB
MD575a13bc5688a5300daa105cf43da6f6a
SHA14e799e778e27b7289739bb79c21ff8f088677302
SHA256b2edf14ae22b463d438f0e7808541cca23e53a4fb07ae7d0d3077d69ac2e93a5
SHA51200cb4c630b98eeeeb24e9b07977e39838b5a913f1e53e63eb455ced156f3f19ab9c0bcb127e1d870946e8b620d9b4e55b3fa2e0dcf477a022a9abea7605e118a