Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    17-01-2025 22:00

General

  • Target

    97cf1cb3030e137b284d78392267ee56ca539c5f4ce131b90c4856b4850b6c06.apk

  • Size

    5.0MB

  • MD5

    f9100a33abc074cc31d60cb9d704a3f8

  • SHA1

    27f394dbf7c281cdd9e3b7e6ffb6920a765d3888

  • SHA256

    97cf1cb3030e137b284d78392267ee56ca539c5f4ce131b90c4856b4850b6c06

  • SHA512

    ab01a350090fd0726d838c9cd17b9737861ddad67456dd82603d1304d6f4dacf0c661e784cb2c113e51f6e72b461da5a096e8cb1d9317b163e7d3e6964c5241f

  • SSDEEP

    98304:s+PQMWLqGsYk47P8OQQ4T18yXqnu1vEPMfCwDYmwiG5/RsqalAz:BP+3RDhQxxanu1YUNO/RuS

Malware Config

Extracted

Family

hook

C2

http://154.216.17.69

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.dowveeojo.jwecwulpd
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4265
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.dowveeojo.jwecwulpd/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.dowveeojo.jwecwulpd/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4327

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.dowveeojo.jwecwulpd/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    acae17194e1e3af1d4a8d8ca4d2c7f6a

    SHA1

    16b3dee5fbbd07589a946f946caf6ac7edbabdb6

    SHA256

    8632c60947ea443f7b19f1c7226c8e354d587b374ce358cd3713198f11bf113a

    SHA512

    be96fc9e82bcdd9c7ccffdebddf53f93279d063599b37bf950e514ae4de331e6dd8823f7703fabaf35d16e5cf44cf0d787dbe24e66b5dbacaa77f067f6581b7c

  • /data/data/com.dowveeojo.jwecwulpd/cache/classes.dex

    Filesize

    1.0MB

    MD5

    76bdb6d7ea1386b32382ee2a3e237f43

    SHA1

    28dba808ca9257dee6bdaf55f052758a53b4e8e3

    SHA256

    ef2b45a7c8d9ac6cd61b7ac4886f2a8568a4d4f9a44b9260790d21357e7da74d

    SHA512

    6c861919e901a6b54f4a3a9e0a93a9f717682e81cbbc130f300e13f6b2d3258e7e87e9ddce505c08bf8f3b1cf0f55006f13be61a4fb7cd312bf0b4f43cca52c3

  • /data/data/com.dowveeojo.jwecwulpd/cache/classes.zip

    Filesize

    1.0MB

    MD5

    2db8acfe4fe8558b4c151bff101e4606

    SHA1

    a772d781bbfc4c1698513b1b837e84821ac1d09c

    SHA256

    19c414337f416bd0ff418d7c745b685bde7b5567bef151dfbcd130f3e1b81644

    SHA512

    a2d49addfac9b67717a44f812d80542f21fd612aafec1c015437b5d1cdd4b8c6b73f6f2944b36b52e954edbd9991ea48d9fde91166ffe338537c666207000bac

  • /data/data/com.dowveeojo.jwecwulpd/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.dowveeojo.jwecwulpd/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    10430eaea5372f53ca8ef4d6bcdb9c1e

    SHA1

    3fc30c3e02d356524bfd816303591139e30dc5aa

    SHA256

    d517223d7112b791cd8944a52d07bb9933306c719bf5839441756571c478d901

    SHA512

    a56031c4ec1af620981d8fd4248e90f34316d5ec1151331026b2a1140a958f81ccee703787637780ee7d5d72aef9df4ba543e9f214524ce06f2c75e663020ca9

  • /data/data/com.dowveeojo.jwecwulpd/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.dowveeojo.jwecwulpd/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    357bdc3f46083e1b8a03a86f2792a199

    SHA1

    8ff39719081bbc175237b3ffe184da145828791c

    SHA256

    009000c84dea3c7b8ddd2faeb9932fb3d79485048266d68142fcac6911c6cc81

    SHA512

    44194c04259b6d83df58266f77066c0bd323f5b5cc2dc95de2e7b3b38e295153acf98e9f4466e24addaabe2a89f9231a84a55dbda5a4f04a001bf2b55c51ab3e

  • /data/data/com.dowveeojo.jwecwulpd/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    e38251ef60fadd8d3daee1e6d21161bf

    SHA1

    02a470f17f4cf35d245db9f82a7a5dae9c1b8751

    SHA256

    00eed260a13136b9b16fd26b5d12ff12fbe316fc47bcd526d8bdc5b17525c427

    SHA512

    eb0b260d5fa562a17b28c87f05eb238672436e4f8205e2b3c86af44e9459ca53164b076a6692597d58d0eb9bee34fd9a4917b52772aae03e9ab49d49b5280636

  • /data/data/com.dowveeojo.jwecwulpd/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    958941014d07601300a6dbc8885c6e55

    SHA1

    3727218cbaa9b112067ecc33ca45f54084f1c058

    SHA256

    db343c0373bf737092cc80db4d616dbb36c5fb335c3936c8823e14d19ed6c409

    SHA512

    29d337dbc22908523bc597b166307f7bb95e2f31a096d49f988ec5a06ddd2a56bdd293fd962b823d1a76ae023c8c637420d62660db41adb6607139b31a1d1e7a

  • /data/user/0/com.dowveeojo.jwecwulpd/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    1712dcf332cbba9c9878fa6adc523168

    SHA1

    63c5de02f9f8898f6b6a94c4a6240513d52a364a

    SHA256

    ac499c0ded1dd14e37e3afd954cf3c0681a776e089b0744457598d564f23cd54

    SHA512

    b3112c8041f1006b7e7a2f5685239cdda650aab9dc6bf7c0061a5a9679fabfe26462ff87b79d4929eb7f95ccbdb44ca9c3b08dfa96c31a0e9592d29fb77b43b5