Analysis
-
max time kernel
146s -
max time network
132s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
09-01-2025 15:28
Static task
static1
Behavioral task
behavioral1
Sample
04.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
04.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
04.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
04.apk
-
Size
5.3MB
-
MD5
046fa6f87d19b5b1bdc1e56486430843
-
SHA1
bae6da4763f6e1f15e297427807b96224b6323e2
-
SHA256
19b8bf21956aed58b1ba425824afd0e2bbb77dc9688f930360da87035c94b735
-
SHA512
cf3ee2fa08ce63de2250c53112a95fbc0cdacff6d3dce924a342fd05d73092cbc745b2736be5f1174dffea71d7a3f9b1bbd57a706eb1a668b570a60e8237a526
-
SSDEEP
98304:FfaNr28dhXTBBBCXconxLiicJybgYu7krEhXGCN5KsGzdQ/d6V8fuSSQGTsxflrp:taY8pCXc+LKyFI7hXJn1/DfxSQxflaYL
Malware Config
Extracted
hook
http://lankfnajasdfzcvvxzxcrrtfas.pro; http://lankfnajasdfasdfcxcescgt.pro; http://lankfnajasdfdsfngaaslsss.pro; http://lankfnajasdfanbabwqeda.pro; http://lankfnajasdfasnbadsfaaa.pro
http://lankfnajasdfzcvvxzxcrrtfas.pro
http://lankfnajasdfasdfcxcescgt.pro
http://lankfnajasdfdsfngaaslsss.pro
http://lankfnajasdfanbabwqeda.pro
http://lankfnajasdfasnbadsfaaa.pro
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.sobleuiac.ptskggnze/app_dex/classes.dex 4264 com.sobleuiac.ptskggnze /data/user/0/com.sobleuiac.ptskggnze/app_dex/classes.dex 4288 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.sobleuiac.ptskggnze/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.sobleuiac.ptskggnze/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.sobleuiac.ptskggnze/app_dex/classes.dex 4264 com.sobleuiac.ptskggnze -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.sobleuiac.ptskggnze Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.sobleuiac.ptskggnze Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.sobleuiac.ptskggnze -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.sobleuiac.ptskggnze -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.sobleuiac.ptskggnze -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.sobleuiac.ptskggnze -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sobleuiac.ptskggnze android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sobleuiac.ptskggnze android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sobleuiac.ptskggnze android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sobleuiac.ptskggnze android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sobleuiac.ptskggnze -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.sobleuiac.ptskggnze -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.sobleuiac.ptskggnze -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.sobleuiac.ptskggnze -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.sobleuiac.ptskggnze -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.sobleuiac.ptskggnze -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.sobleuiac.ptskggnze -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.sobleuiac.ptskggnze
Processes
-
com.sobleuiac.ptskggnze1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4264 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.sobleuiac.ptskggnze/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.sobleuiac.ptskggnze/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4288
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5125f76b00f5e4499ac35fa58885ad484
SHA1434f8caf56e4a3db9c51e9a77d1646ba650d3eba
SHA256fbdb9c952a96cc40f067cecb3e361acfe4601ed33bfc75f16f8f3748ccc0e69e
SHA512e6f56367d375f00873b9ffb7e20cc55ef3681125aab701796cb8320689300663a2917338cbe8301b139dcf345eee702b89701ce251b41e3511b1d173447b2caf
-
Filesize
986KB
MD567fa328c5203072c63147e723982aefd
SHA1b72d8bcd1100a06192b5c136c0ea3293762ee57a
SHA25664a6fa6b362eddb3ec00d14fdd4ce2b39d16a7fc5ecc161961411f528cf9a2e9
SHA51235c687860d70f9839c4a6dea6931609b91623bbfcc8bd34fbd9cf3d7c66115b68d18bc97c76956377bae4f22656ffc9dfcdd19c4a21f876a9e945e6775599b3b
-
Filesize
986KB
MD5721246fe1a4fba2ddc3876f84559aa25
SHA10f2ccbf4fc3d08b5ff318ea78259dee9d6f146b9
SHA256b11573e6f44eeb5f31bf090c2ec4fbd8c210db8a7a7368d481befefd117f6ea1
SHA51266637608969d4fe97b04928b9d8b7d2e95230489cd61fc9b2dd68e759e56273a677d9ee59086175b3319e889d15295f29df260e853d237ecf33c9cb61f0f7724
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5e7a81a1dc615a804516f77fc370a9e76
SHA1d52e34af3f40284de43d40977c425069e13d064a
SHA256dc7e6e30df733b808b0c2c6083d24dc4a2165595956aed73a263e184b9375801
SHA5129f7e9b9fd99e487f25e2ea667a06ba794f9bfe89432f293d33b60b99a8ac8f10c173c66b4e700801ff111dc538ac191a68e63bfaf1150fbef510a139c2c25673
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
108KB
MD5a4679d7faf824d17404c101acce79093
SHA1220bcb5c1d8acaf71d8dd72ad23bf2890cbe8825
SHA256d9b0cf5a8f8154428755b062ed4f76408b8ff15de8b929e13c09f72a3ad34430
SHA5128a424be1e1207074dcc1a6b508a3c434df55062a01b20dba906d5856ef23d21e146d30e08b24de10a71b76baa1b4b4a0c718df0f6f9306ffbadcfc4cf7904425
-
Filesize
173KB
MD56b3b28ab8d4f4cb0268bcef5fdc84198
SHA19a719f06390bf9b034b1927c4efaa443b79c83cc
SHA256a6aac2cdbdd52b7a403ee5ae3c937ef4b4fa634016c45da6b6151754ac485e2b
SHA512c4f43a36562d58e4048a79821bc113fea5f58f0947c9a1c30d2159644559de9e3fe508f926b0db5b7179ed17a24c452a9850ef3a9f31aea0c0f4c2fe341bfc03
-
Filesize
16KB
MD58a223beeb5778746426fd211b5e8c03f
SHA175725ddd31d40408ea2e99e78a34e140d6a63ee5
SHA25697322fa58e987a687c0ccccac20b626333e7d2c15b6a845d19823d556d33f058
SHA512d560acbeb05f97582dabe21afeb6356f4e08ad3f9288b2a72eb597e55dc31493d00b842f3284652a2598fb9e77667ed9b12f88fd6cb2ce38f46496baf311f08e
-
Filesize
2.1MB
MD5b17f222e6fbd89bff40096839c2aa0c3
SHA1094dc29fbd4164a17fb3936bcbf4af955c7725a6
SHA2563c806d394447094c6c34ac69e724eff736c965865ef279f0c1771818283e6601
SHA51286a70ea37262c1874ceba0773936d2f18be0e6fbec988ed718b64e5dbec1e6739ddd3f87563a520ee735ca9b709581c25c8691998eeae6375d83b00b8a29f9c2