Analysis
-
max time kernel
22s -
max time network
134s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
16-12-2024 12:15
Static task
static1
Behavioral task
behavioral1
Sample
com.ygkaxidkh.ffldaorgq.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
com.ygkaxidkh.ffldaorgq.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
com.ygkaxidkh.ffldaorgq.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
com.ygkaxidkh.ffldaorgq.apk
-
Size
4.5MB
-
MD5
2822ee6f2c62e0d59e3a6e3b49936bff
-
SHA1
fa1d9b7d1ea36004c5de7b7e5dbf4e59d6993881
-
SHA256
2da377529967c57cf738206ad5a1414485658daf7c26e66a6c474b165442f1b6
-
SHA512
00f39e5ec2bc113c8e6e23d1dba2b41fcba84788a6729592451e9c635cc9d36e2bfa0c6d68531fa82d81d4549a17a56355961a2bdd9bcf30f4c0fd7cd7fd4443
-
SSDEEP
98304:19HLjEpXQoLXV4W0WiWmOC3POywZLRnKhbLJaojI+lnLwTNSM1eR:7cXDXeKyyJobLJjrlLwTYM1m
Malware Config
Extracted
hook
http://rocketstylebuildinftoday.online; http://rocketstylebuildinftoday.xyz; http://rocketstylebuildinftoday.icu; http://rocketstylebuildinftoday.live; http://rocketstylebuildinftoday.shop
http://rocketstylebuildinftoday.online
http://rocketstylebuildinftoday.xyz
http://rocketstylebuildinftoday.icu
http://rocketstylebuildinftoday.live
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.ygkaxidkh.ffldaorgq/app_dex/classes.dex 4473 com.ygkaxidkh.ffldaorgq /data/user/0/com.ygkaxidkh.ffldaorgq/app_dex/classes.dex 4473 com.ygkaxidkh.ffldaorgq -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.ygkaxidkh.ffldaorgq Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.ygkaxidkh.ffldaorgq Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.ygkaxidkh.ffldaorgq -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.ygkaxidkh.ffldaorgq -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.ygkaxidkh.ffldaorgq -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.ygkaxidkh.ffldaorgq -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.ygkaxidkh.ffldaorgq -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ygkaxidkh.ffldaorgq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ygkaxidkh.ffldaorgq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ygkaxidkh.ffldaorgq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ygkaxidkh.ffldaorgq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ygkaxidkh.ffldaorgq -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.ygkaxidkh.ffldaorgq -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.ygkaxidkh.ffldaorgq -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.ygkaxidkh.ffldaorgq -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.ygkaxidkh.ffldaorgq -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.ygkaxidkh.ffldaorgq
Processes
-
com.ygkaxidkh.ffldaorgq1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4473
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD544723267c98402b080805eaac5c75a44
SHA17be7566788529318eeee233078e881f7616ca414
SHA2564a22f11437441381266c2fd88b640502a3ee25415983a16c8eab1eab326fa272
SHA512da8ac124a46d08eb8bb88eedc1f83e586c93c8ffeab07467260d07429cafb8b0b4a42e068e2c6170d6f252116866e8048e4920ceeee9c032ac751cf1d720c9ae
-
Filesize
981KB
MD55ea9b6336fb131fdae456fb6601d2eae
SHA11f6478804f427703db8fce112b02ecaf8d64499c
SHA25662aaeb31eeaaef03a9c60c2b97d3190baadba125919e337fe1dd6a75432d6e9a
SHA5121bf6daa3ac921f86ae75505963e3d4dc9ea312ddccdb5caf0dc4b9965d449263d1f84cbbc68397d362a71ed931b7fda8360d5afd1271b1b26e782dadf1dfa5fc
-
Filesize
981KB
MD58d6918c1f9765d4336e429c8841de7bc
SHA1a66e74297ba0f5ab1a9c8be19b2f112660336b77
SHA2565573a9c320c20a51fb4431999efd0b937b3ea8daa1c98c4b21be87f71a2a9a31
SHA512bdd2a3376f6b4626ebaab50f61da77e6881e1f1548afb4c7e49bd8dad475b8b9675ffe9d3182a66e05ad7bad0e198950983a50434ad2d0e7d591c3a51b4b2897
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD5d12ec804fe93ad2f893000a793e373d4
SHA1325644ed1868c449e9927708e06a477be30c2b62
SHA2568870343416559cedfb93e57fe2adacaa26b4b62d448fb546ec974abc7950b623
SHA5121226fb57901fe826e045e205e09fc91c66a261c7d3bf1a1a419067e8377e7caf0a66a66cd34cf88ce06267586b3448a3453961722d3d9fbdccf9f1c02ebccb95
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5d6ec074f3c226fb535b747e212cbd77c
SHA1ffe420b7ca55930874e7639e8007d545ad74e6ec
SHA25670e2ce8b2238b4f3ebe56a0cfda904141b591ed3d47f1bb901b450cabb0ed550
SHA5128b4d43fd166f0efcf5d0b4e606009b9dd429bdc9e1d107b395ebf38ef5781f35bdcfb22395f245056734bb7c75adfd36f7edb097e59780a5f6e105a8c5942522
-
Filesize
108KB
MD50fa14692b15bad8149e59a8e391eb6d1
SHA19de4c250ef1fe3b57d9767dabd2658da99abe423
SHA256a2e032b86f279ea3aa75f9cf67bf53b96dcd4b7421a6594a0c3215d52e7ba972
SHA51218e46c957dabd7d9915662c879039d0af6f0f6b83c26d53d95fe8146dd6ad8acfc91d9d1b8c9c66cf233e36e988ff450e5ccd91b0b97d9cf248c93684e4a60ca
-
Filesize
173KB
MD506ac9347c98571f9bb1b51d33e56e7b8
SHA1312461e2176195790116aa789ca9f4a4078a0a1a
SHA2569c12f06cbbd4fe63670955aa7f003bb7dd0643ebfd593bafafe2a1a338cc116d
SHA512522374fd53d4cb5dc6d4b3e78597a2d93845ebbf3f6d494c0613e89879a858d6e0d426c9af72a9e4b4738eb005545ebeb471f5b9430954130b8b004013bda585