Analysis

  • max time kernel
    144s
  • max time network
    159s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    24-12-2024 22:02

General

  • Target

    73bd9f60a034796bd96424c277ed9543fb614b4009ca28fbd65e8d6c23310518.apk

  • Size

    4.2MB

  • MD5

    4b1e2a0cfcd1ffd4af2af556614c3575

  • SHA1

    078983893a2b8793cdd8d3ef6182bea21922c6ea

  • SHA256

    73bd9f60a034796bd96424c277ed9543fb614b4009ca28fbd65e8d6c23310518

  • SHA512

    4e404ac8b0dc3ec23fc7a0a77bcf399a093b8d24b182d3d7bc998480282732269d5bb86824ac1e104e715ce3f11215b6e8d2b418eeed22164cde2fcd3484389e

  • SSDEEP

    98304:ebur3ALxCIl2C42bdY9hpQaPD32KbOzKQ8xGaIbFVt/q9:QQwL0Idba9hqoDFSp8xJivt/q9

Malware Config

Extracted

Family

hook

C2

http://154.216.17.184

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Reads information about phone network operator. 1 TTPs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.eeoyiyvtz.tutthssxv
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4475

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.eeoyiyvtz.tutthssxv/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    a39806df00e73cd4bdd63b778b462140

    SHA1

    9c90d1b2d5fecadc49795fcdd35e81f7698ec9c6

    SHA256

    c288139f5ef9ce09a50073f73bf9996142d4f31cf31694fdc5be9896c5b786b8

    SHA512

    19e15304005b47cd670a394f11bf64c3443ef2a3b72ed79758b1fdf756b0a774fc42a2fbeb37dde5289836c83991feb2d7ac843d88bce91a8593a2461ebbc835

  • /data/data/com.eeoyiyvtz.tutthssxv/cache/classes.dex

    Filesize

    1.0MB

    MD5

    a369acb5fa00c07f9ae1b56045f62655

    SHA1

    a6c1b306ecdc076e36aace7aecbf028de19b0903

    SHA256

    9b7421f98ccafaae04ca86c6341ae9ccfbeb6f1721852c06e9f594af8d4d7844

    SHA512

    3bcb8ac256ac18ddebd6ae18062e8fe046a6ff888b306c9e6767fa2e5c617eaf97ec02e4c09667c3d22adda36e385eb64a18ef2ca06630b0e7efdbfdec9f67b2

  • /data/data/com.eeoyiyvtz.tutthssxv/cache/classes.zip

    Filesize

    1.0MB

    MD5

    d03b24a9657793230f9055e245d06a30

    SHA1

    a0c05cea109d11bd07b45d91a91d94a341c04778

    SHA256

    2c35d680c4b36bb510b2e8cd64c7a2af7e951229ec7e02490f179b0de32a18d2

    SHA512

    4bb3721da6823842456ce9155c7122d660bde9f71ce83d0b3957e5d98750053d6db4df18bda41ff326e9042622786dc1055a7e9b981780b95753a272f7611a1f

  • /data/data/com.eeoyiyvtz.tutthssxv/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.eeoyiyvtz.tutthssxv/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    7561b8fe3d7a6ecf7129e554de530efb

    SHA1

    7890a80454a5fc9bc85d28a75b4a546e89719e35

    SHA256

    fb3d8d1fb0db32ca10c3e83cc8fc8f5d977f5891133b465d75155e66f4bc16cd

    SHA512

    8a9e8c3113a10405c6a90d747c07aad0f41985a8682c1b3185b9125378320edec409c42fe6c095faa7eaffc96db62e42cc850fbcc433f55a6dc84547645960cb

  • /data/data/com.eeoyiyvtz.tutthssxv/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.eeoyiyvtz.tutthssxv/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    8b6ec24bd3304ebeca137567d53bdb92

    SHA1

    cffc3d2c957f8a84c12536bf9d565ae88a389a49

    SHA256

    c31390f71df964fe4c0d720f43c401ad108913884ebce1321aaf45e77063f374

    SHA512

    c05cdff83e239aef68d4b1dc64b2470eb08653c7f4ea9de3aea0445210968f3fed137ad07b4613e4178d2785058e6f02a49bc2446315bb4430ed473d1d5e96c5

  • /data/data/com.eeoyiyvtz.tutthssxv/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    bedf9da5894189e73bcbef6be472aed8

    SHA1

    d99d3be48c5013a18536112cc6ce4ab48a97cf52

    SHA256

    85061e71c9551bbf3aa6d496abd833307ec13c4f2a03b3081bf79c7307a2233d

    SHA512

    ffeed0ab4bd63551cb9db629cd3327c9435d6fe4405ac4cb96e0b89bf1060c5c16ef01e363f2575927765f8ffe0ab29b91c519001c5c5b335d4c7c68e1997199

  • /data/data/com.eeoyiyvtz.tutthssxv/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    82ee793107d3a511730b1bdd2c091814

    SHA1

    faceee19fff8f4338c72e137de36f1083e310b9f

    SHA256

    f2c026123a576c3829180a56e22c2cae963a650a4bd8cfc91892ac04425a8a78

    SHA512

    01d28c2e5d7d5a967ac34df369f1bdb85d8264193fedd81b51bde638b35126edcb30563349ad2aeb99ac025d2eb369a9caf6b7e928eea5f275c5924bf0dd2485