Analysis
-
max time kernel
26s -
max time network
151s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
13-01-2025 22:04
Behavioral task
behavioral1
Sample
d10e8919f8ac9b20ced32e5a6f3fc5656dce260770645db0876f5b3c26fbf1fa.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
d10e8919f8ac9b20ced32e5a6f3fc5656dce260770645db0876f5b3c26fbf1fa.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
d10e8919f8ac9b20ced32e5a6f3fc5656dce260770645db0876f5b3c26fbf1fa.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
d10e8919f8ac9b20ced32e5a6f3fc5656dce260770645db0876f5b3c26fbf1fa.apk
-
Size
2.9MB
-
MD5
f5d2d5ce96601c7e2ade04ef5929768a
-
SHA1
a731177975b2928b37a707c92403e785b05df95b
-
SHA256
d10e8919f8ac9b20ced32e5a6f3fc5656dce260770645db0876f5b3c26fbf1fa
-
SHA512
b33018f730f818df8835c15444fbf6604cdf9ead25f4c0238be45ceac6032d9c2eea5fb3ca2ca7bb52240ac77a416973b5c45e80bbf519fee003b2a4094f883a
-
SSDEEP
49152:SMq2R40/DzBsi9ZKGPM6yogMBAuFY3DL5YBhk86OjYAMMiq+CPgjOmFbTwRfVHn9:tOqZ1xFgM1FYBihT6pAb9LqZFbUbfFuC
Malware Config
Extracted
hook
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.zadasebeceda.necepo Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.zadasebeceda.necepo Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.zadasebeceda.necepo -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.zadasebeceda.necepo -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.zadasebeceda.necepo -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.zadasebeceda.necepo -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.zadasebeceda.necepo -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.zadasebeceda.necepo -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.zadasebeceda.necepo -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.zadasebeceda.necepo -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.zadasebeceda.necepo -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.zadasebeceda.necepo -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.zadasebeceda.necepo
Processes
-
com.zadasebeceda.necepo1⤵
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4787
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD5c676201760d0482196457a1892005f28
SHA109412e029b8480b1b062df622799280103ec301f
SHA2560f0cd333df901742a02e2187330a8353fbdedd8dc9478c5c14bb5661a7b530b2
SHA512d4487fa533b542e77a87fe18719a43951eac47da5e679bf74676fbd9a4e3280a2c1a5d94157b39de6d72c49260f002b67cba551fd54eebb0006468ed70129325
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD56dfa88988a7eb2d1245dda7932661f32
SHA14539bdb309c805a9f9e4a0a69de2fea79b325525
SHA256191f8b0ffdba161a51ece2bbed996620354c346d3bbf1536f1a8e39b33098706
SHA5120e7773a0c5e5aa3850674a1e0585989bc9c596344d38d290bd135dde5ff8f542e098b57a8b154ae929aaca344a85b2adac6e49200b60c0281c1f4a2b0cc48ecc
-
Filesize
108KB
MD5ed25db576575be5e02bdf2e4e1bc7beb
SHA18c11e688a94072dfc3d9a8f3bcfe88370e75095d
SHA256bada3fb709ffc2ed173d0e330b00aab4840c68f4ac648d1c21ce3fe8b2fd8db9
SHA512aea7b33b2a541791d81fe07c395971d82174536ec8e34704314201556315330835281fd9badd3ec90589bf58dd879baf3e706b7c4b096682ad5d2ad5122f34a2
-
Filesize
173KB
MD55a7e7b12d5ce1dab61f534a30dff2724
SHA1f6ca290cc401e00efb92beb5be65ff2bf277c327
SHA256cc0a7a76dab4a55ed6b5a8b891485bd47e7d2765758035d98f9e92009132fb9c
SHA51209fefa330546da4c2ed209288c7ca8d09edd362ccf6929b6d1fa3395a91e9b8de199ddc233a6743cd96dbadd838842c0c480010b838b21385fb4cc63ec537210