Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
09/01/2025, 16:18
Static task
static1
Behavioral task
behavioral1
Sample
decrypted_2587456092053789685.tmp.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
decrypted_2587456092053789685.tmp.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
decrypted_2587456092053789685.tmp.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
decrypted_2587456092053789685.tmp.apk
-
Size
4.5MB
-
MD5
49a7fb554e1a92d6d1b071664346ace7
-
SHA1
09fe4fd712ad83941e7cf6afc2468c30de59cf4e
-
SHA256
26db08ef808409eb973a698d26ac83d99f46c8aa7fa35c96bf8140fd94cb2ca1
-
SHA512
35a610afad18e758b548fe107ae4b306aef08aa2f9c06d5c3501365b85c8880ceb7be0cec9d13d5bbffd28957c67c2ffa1e00ae883f7ff67a3ccedfaee456b72
-
SSDEEP
98304:rUT1biIJ4atOtQ7YBMEGFQXKZ02/a1t6nGGwGrpji8qTueB:QT1p1wB0QXKv/a3i9rNWTuw
Malware Config
Extracted
hook
http://lankfnajasdfzcvvxzxcrrtfas.pro; http://lankfnajasdfasdfcxcescgt.pro; http://lankfnajasdfdsfngaaslsss.pro; http://lankfnajasdfanbabwqeda.pro; http://lankfnajasdfasnbadsfaaa.pro
http://lankfnajasdfzcvvxzxcrrtfas.pro
http://lankfnajasdfasdfcxcescgt.pro
http://lankfnajasdfdsfngaaslsss.pro
http://lankfnajasdfanbabwqeda.pro
http://lankfnajasdfasnbadsfaaa.pro
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.mkjvmvrwu.uwknrkfyg/app_dex/classes.dex 5237 com.mkjvmvrwu.uwknrkfyg /data/user/0/com.mkjvmvrwu.uwknrkfyg/app_dex/classes.dex 5237 com.mkjvmvrwu.uwknrkfyg -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.mkjvmvrwu.uwknrkfyg Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.mkjvmvrwu.uwknrkfyg Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.mkjvmvrwu.uwknrkfyg -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.mkjvmvrwu.uwknrkfyg -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.mkjvmvrwu.uwknrkfyg -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.mkjvmvrwu.uwknrkfyg -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.mkjvmvrwu.uwknrkfyg -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mkjvmvrwu.uwknrkfyg android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mkjvmvrwu.uwknrkfyg android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mkjvmvrwu.uwknrkfyg android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mkjvmvrwu.uwknrkfyg android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mkjvmvrwu.uwknrkfyg -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.mkjvmvrwu.uwknrkfyg -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.mkjvmvrwu.uwknrkfyg -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.mkjvmvrwu.uwknrkfyg -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.mkjvmvrwu.uwknrkfyg -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.mkjvmvrwu.uwknrkfyg -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.mkjvmvrwu.uwknrkfyg -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.mkjvmvrwu.uwknrkfyg
Processes
-
com.mkjvmvrwu.uwknrkfyg1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:5237
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD56a9f10ce16936f5a788caecc4acc528a
SHA19a3843da361fde32d1f75e3499f9ba53c2dc527d
SHA256a9641733758c72633c3cad270795b2a14ba15eeeb1a24c4c6854d98eff20ba99
SHA512850dc528e2ed0f77d02ca6987f3e3f266c9942d90d6681db220b58d7f00836d39eefaf24277dbde394daa18c3db4d003b5ab84f63531415dcd402d33ae97106f
-
Filesize
984KB
MD509c1f9b2a250de233cb0aaeb1243a1c6
SHA108a4cba0bad96b0666959bbb26f0d3efe43cb4bb
SHA2567e59131c913b569f58202babb0f33eba0838f3a1c4745c3d219dbf5c49399391
SHA5120a1d1e717c98ce44163b3eab601b1572c9efea35de4dbba92ee961331b10985c8a7ab9169dcfbdb75283c39271ff46779cb2870fa80ded1ffb7671293554a9da
-
Filesize
985KB
MD56b94e809192aedd113b81f9c95ee6305
SHA13f9aed7ab69f0da2a1bb00cd13cd8a4285694add
SHA2561a274231171f58e109492c2652fda9d9e1662cbdd64fd6f8bff0395c1240edac
SHA512d46c4ad17f7e55294d0edd340396fb5c17f9ff0d2230ce198b161e56706572fd4a6930b59efe091d600a3d6eced37cd68528a2a2c00255ccd278367a814a88b5
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD58b997c6f7d7f9ee3a0e87ffcbe8a15fd
SHA1e141fe2b2100dd39fe4d195701f63d2dff322731
SHA2564a88f11463630c04ecbbefe81fe243d08496505a733809e0f202ce616f9a033e
SHA512a85763f06860bbe0ac9fcb62f42ce19a222eb28ae4c7c1842144e5135005f0b900b8adef841caee91bffd3ff9587254a22f80d39501df48bbb43cc02b132be89
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5418e83c3004348a0c3cf806acee8075a
SHA16042aa13b4aaa21d52dd60728a577ca58831fc95
SHA25666f91b8d3b0ac1e84bd27ca753e49389a66dc851368bbc7fb7263104ce2a3e23
SHA5120761b1158a039900fe03ecc8be6fa481f71ed45da56b25f4f5dd7cc517d41a819726c1df6e7cfa643120ad1fade3ad439af8cfb1df16b588d36dce0edb2cee02
-
Filesize
108KB
MD5d10b13323472cb6db70d4ed02f87bf20
SHA13b0c2815431f6a6313e827c9f63ce67073333b79
SHA256115ca861a98842ad73061194200797282a64ab7c088ddc15ad8a58767d0cc8d0
SHA512870bffe1beba02506b10e979a0d3211f4433b883e5304ee71fc2109c6d1c4ffbf5020af25dad9d46a82fa2190cade29005631639809349ccb9cd710782bffc92
-
Filesize
173KB
MD5563eaee8bafccf42086e043b0c8df455
SHA12b89a0549a4cca536d0fab29638975953ef0e0e6
SHA256acc4f7c88389e8086e4de0f2afe32f7d68347891241e8449f330806ee70627c5
SHA5126de04ac9cb301f9b3533ea4282bbfe0abd39f56ad13931b649aa276b000dac8565a295701f5faf711331a0595eb836b7099aa66640b614529ccd7a0965b2a3b2