Analysis

  • max time kernel
    37s
  • max time network
    152s
  • platform
    android-10_x64
  • resource
    android-x64-20240910-en
  • resource tags

    arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system
  • submitted
    24/12/2024, 22:06

General

  • Target

    5cc82c445bd3caa9da02fdd8e6f9d06211a823db9f39f94ee201e0ab47ee55fa.apk

  • Size

    4.8MB

  • MD5

    bfebf256cb1eab674a44fc384026141f

  • SHA1

    57fcc655ed485300dd671f8a51f669968ccc093a

  • SHA256

    5cc82c445bd3caa9da02fdd8e6f9d06211a823db9f39f94ee201e0ab47ee55fa

  • SHA512

    40602f02145328a599541232b6d6d4c54b54fe404911236ec032c3794d4e590e246d61d72643b15665c832b6ccc2c7873a3de81fda66d0bfb6000539875c819a

  • SSDEEP

    98304:7Nc1BktHgHhLY3qFSOIdxDbrXDXNTloJbfdapK8I0If3F:BkyHf2FyxX7DXNTloplp8I0IN

Malware Config

Extracted

Family

hook

C2

http://154.216.20.102

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.nwybcynna.hukmpcfas
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:5102

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.nwybcynna.hukmpcfas/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    a5f6abd47e42ea2ffbe99d78fda1ad4f

    SHA1

    39a0109499ee5cc44accbfefd80bb192058e571e

    SHA256

    7c3d47dfd938e2f38e782bbe82ea7f484660034f62f6fb4ddea0b891b3991019

    SHA512

    d3efe6f2a3454700db6ff2b02d4b765d3e3e0e7764854cabb68166e6c5b85086f80643698394177577a1c3aa6f4203989f98d94ddbebb95809773cefd4c90b5e

  • /data/data/com.nwybcynna.hukmpcfas/cache/classes.dex

    Filesize

    1.0MB

    MD5

    d6dc3bd7afc7c7110661697f450b3d36

    SHA1

    729429de933755ad7a06382e0b43f50163d0f986

    SHA256

    80cd42115a61ad9bb1d0a6e6431bbb5fa3500c2862a04e52fc107f8d81090c1c

    SHA512

    25c1a21cbab20a4e045da5968e20b188d207109fbdb385196ca64cd16d9f49c5542453d30ab2d1bfc1040487e0046fa0e5c908b423ec0dbf986f76449586a804

  • /data/data/com.nwybcynna.hukmpcfas/cache/classes.zip

    Filesize

    1.0MB

    MD5

    400eb1ea3f0c5e3b8953b4d2203d117d

    SHA1

    0f95e89686033b44baba9439a1d9ad8441bf18a7

    SHA256

    ffe6105f59b7e3f44f578df8fb563ee6c17fc19a2d945dcc3e097283fbd9d3f9

    SHA512

    2d548f80b351c4921761eb7658a8233f92fb7719ff9e6035fa54300073ec59dba5f68b6205ee3cf502a0daf2a35cef535922882c96c2050773edf1ce6ba8c662

  • /data/data/com.nwybcynna.hukmpcfas/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.nwybcynna.hukmpcfas/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    cbab5dccc3edb40efdb434594b2f1f25

    SHA1

    a3ea3cdf6ca5b4c101818362bf59a03b64ed8a6f

    SHA256

    06178ca21c56fb93b8396993d208230a9e37b114499ca541fd9e63c334e05d56

    SHA512

    3a71977316312b3fdb20a4153522e8fbabec3341172068eb85bcda04558f4289d1cd0171184c7474ac25d1305ba87d59b79d672de0aef4de2b42fe16593123b0

  • /data/data/com.nwybcynna.hukmpcfas/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.nwybcynna.hukmpcfas/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    a46078cde4e304ca44806defb64c42ae

    SHA1

    7154b08f9155b0ba27fb79027ca6d22d0b4f891c

    SHA256

    d56e5e835a4e2cbc8882b5962f9690fadfd3322717e13589561b5f9f77bb3d18

    SHA512

    e3687b52d5e96f121793ac4bdf12dc95ff407a21476e056412a752b73e19558be86f69756835bb6bfaafbf07d4b9a25b830eea30fc61dab1c8a42544bf1fcc67

  • /data/data/com.nwybcynna.hukmpcfas/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    8d3e2e6241fe0256d1a6cf87ea5fe34e

    SHA1

    820437ce17e2c23c2f45c3ec95b77cb9bd4a4465

    SHA256

    9f31868d9315b00207af2ce8b227e93f7704566c89f161ed0db765c9a001fc50

    SHA512

    17fb6eb373c4656c93a3a1c16a342ec68100d2e4b02e045af8197860fce74a92aff7a0d435852e55da3b186acaa0b74de60bad4f54d86f566c280f06788cb003

  • /data/data/com.nwybcynna.hukmpcfas/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    323f615925c3ca608a4e410c719438ba

    SHA1

    cb38e926890ddcdba51298e6e46edf47d3ddee67

    SHA256

    8246c986dd61eb4de9bbcd49765a8e55a480622c35356a5fc7c6e29d2168a77e

    SHA512

    66c4eaf9180d1509b888489402634cd243345cdbc7ecfbbc636c8eca8b60556210bc55bc1a61fe2cd45ea449f8570eb0e014ff808b6f05d80b067c4e35ac5706