Analysis

  • max time kernel
    131s
  • max time network
    159s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    24-12-2024 22:06

General

  • Target

    5cc82c445bd3caa9da02fdd8e6f9d06211a823db9f39f94ee201e0ab47ee55fa.apk

  • Size

    4.8MB

  • MD5

    bfebf256cb1eab674a44fc384026141f

  • SHA1

    57fcc655ed485300dd671f8a51f669968ccc093a

  • SHA256

    5cc82c445bd3caa9da02fdd8e6f9d06211a823db9f39f94ee201e0ab47ee55fa

  • SHA512

    40602f02145328a599541232b6d6d4c54b54fe404911236ec032c3794d4e590e246d61d72643b15665c832b6ccc2c7873a3de81fda66d0bfb6000539875c819a

  • SSDEEP

    98304:7Nc1BktHgHhLY3qFSOIdxDbrXDXNTloJbfdapK8I0If3F:BkyHf2FyxX7DXNTloplp8I0IN

Malware Config

Extracted

Family

hook

C2

http://154.216.20.102

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.nwybcynna.hukmpcfas
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4504

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.nwybcynna.hukmpcfas/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    a5f6abd47e42ea2ffbe99d78fda1ad4f

    SHA1

    39a0109499ee5cc44accbfefd80bb192058e571e

    SHA256

    7c3d47dfd938e2f38e782bbe82ea7f484660034f62f6fb4ddea0b891b3991019

    SHA512

    d3efe6f2a3454700db6ff2b02d4b765d3e3e0e7764854cabb68166e6c5b85086f80643698394177577a1c3aa6f4203989f98d94ddbebb95809773cefd4c90b5e

  • /data/data/com.nwybcynna.hukmpcfas/cache/classes.dex

    Filesize

    1.0MB

    MD5

    d6dc3bd7afc7c7110661697f450b3d36

    SHA1

    729429de933755ad7a06382e0b43f50163d0f986

    SHA256

    80cd42115a61ad9bb1d0a6e6431bbb5fa3500c2862a04e52fc107f8d81090c1c

    SHA512

    25c1a21cbab20a4e045da5968e20b188d207109fbdb385196ca64cd16d9f49c5542453d30ab2d1bfc1040487e0046fa0e5c908b423ec0dbf986f76449586a804

  • /data/data/com.nwybcynna.hukmpcfas/cache/classes.zip

    Filesize

    1.0MB

    MD5

    400eb1ea3f0c5e3b8953b4d2203d117d

    SHA1

    0f95e89686033b44baba9439a1d9ad8441bf18a7

    SHA256

    ffe6105f59b7e3f44f578df8fb563ee6c17fc19a2d945dcc3e097283fbd9d3f9

    SHA512

    2d548f80b351c4921761eb7658a8233f92fb7719ff9e6035fa54300073ec59dba5f68b6205ee3cf502a0daf2a35cef535922882c96c2050773edf1ce6ba8c662

  • /data/data/com.nwybcynna.hukmpcfas/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.nwybcynna.hukmpcfas/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    26b9a932b0c0a0a905273f57280d8bf7

    SHA1

    2b3d882a81056b560fbe35efbb25e3eba4c2a8a8

    SHA256

    75dae1ef61e94d6f1b1b71636d49964a6d23fda118288e1bae624541262c0882

    SHA512

    03c5ac214f8518491a294d25c4c398fb34559722804d4ba9fa04007ef486d1158914dbd51153fe480f691b14c701816d53a394c793831134d046ec3e6138fcf8

  • /data/data/com.nwybcynna.hukmpcfas/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.nwybcynna.hukmpcfas/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    5d2951454734381b8477976c0d4a5c07

    SHA1

    2f42eeef998c15bedbec916bdefa9db7210263f9

    SHA256

    4418c3d16a158485fdf98a9f2f4c76f77ee61df2d4ef87e9965a16cfa013f7d5

    SHA512

    71caf255ce55c8f40ef63c55b6e5c64cce58fd4bb029bfe6c292f8a0c5e2c926711b01f12649dd25515a148dabfdc39c581412d671676bf1c546562e5dec7956

  • /data/data/com.nwybcynna.hukmpcfas/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    b7082981b2f0fb4a89700ca5c71dcf83

    SHA1

    cc678fb346bb16b4a36259e1a90279ece925152a

    SHA256

    5eed3833960647a1bb05a7fa27a7abdd9d16b047d52e0f9daf8b4c9f8d28a380

    SHA512

    bb07f92b307759d51fc7a84be52c7989c6c20d1e98326862b0c961104c05dadd6f92770dc5bdb66f80169c3b06a2a03065abf16a6a551e6efa10447d3ebf4c86

  • /data/data/com.nwybcynna.hukmpcfas/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    902971985dd54f80ee4697df4e83ab35

    SHA1

    0c6ff707a22f81272e84284d2fbff534ccfd3cce

    SHA256

    2cc034079eb73e89557a488a724d99a0c764aa1f0b08e669a0d7820c29339390

    SHA512

    463dac4e296ac8decabbc99dc5b656fb70fc69d27126c8938acedcfff06917f51143b6fc2c0e5d1c60fddd5e12788b51becb9be31bbf47d2ef5489a2798f7185