Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    android_x64
  • resource
    android-x64-20240624-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system
  • submitted
    17-01-2025 22:00

General

  • Target

    97cf1cb3030e137b284d78392267ee56ca539c5f4ce131b90c4856b4850b6c06.apk

  • Size

    5.0MB

  • MD5

    f9100a33abc074cc31d60cb9d704a3f8

  • SHA1

    27f394dbf7c281cdd9e3b7e6ffb6920a765d3888

  • SHA256

    97cf1cb3030e137b284d78392267ee56ca539c5f4ce131b90c4856b4850b6c06

  • SHA512

    ab01a350090fd0726d838c9cd17b9737861ddad67456dd82603d1304d6f4dacf0c661e784cb2c113e51f6e72b461da5a096e8cb1d9317b163e7d3e6964c5241f

  • SSDEEP

    98304:s+PQMWLqGsYk47P8OQQ4T18yXqnu1vEPMfCwDYmwiG5/RsqalAz:BP+3RDhQxxanu1YUNO/RuS

Malware Config

Extracted

Family

hook

C2

http://154.216.17.69

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.dowveeojo.jwecwulpd
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:5054

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.dowveeojo.jwecwulpd/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    acae17194e1e3af1d4a8d8ca4d2c7f6a

    SHA1

    16b3dee5fbbd07589a946f946caf6ac7edbabdb6

    SHA256

    8632c60947ea443f7b19f1c7226c8e354d587b374ce358cd3713198f11bf113a

    SHA512

    be96fc9e82bcdd9c7ccffdebddf53f93279d063599b37bf950e514ae4de331e6dd8823f7703fabaf35d16e5cf44cf0d787dbe24e66b5dbacaa77f067f6581b7c

  • /data/data/com.dowveeojo.jwecwulpd/cache/classes.dex

    Filesize

    1.0MB

    MD5

    76bdb6d7ea1386b32382ee2a3e237f43

    SHA1

    28dba808ca9257dee6bdaf55f052758a53b4e8e3

    SHA256

    ef2b45a7c8d9ac6cd61b7ac4886f2a8568a4d4f9a44b9260790d21357e7da74d

    SHA512

    6c861919e901a6b54f4a3a9e0a93a9f717682e81cbbc130f300e13f6b2d3258e7e87e9ddce505c08bf8f3b1cf0f55006f13be61a4fb7cd312bf0b4f43cca52c3

  • /data/data/com.dowveeojo.jwecwulpd/cache/classes.zip

    Filesize

    1.0MB

    MD5

    2db8acfe4fe8558b4c151bff101e4606

    SHA1

    a772d781bbfc4c1698513b1b837e84821ac1d09c

    SHA256

    19c414337f416bd0ff418d7c745b685bde7b5567bef151dfbcd130f3e1b81644

    SHA512

    a2d49addfac9b67717a44f812d80542f21fd612aafec1c015437b5d1cdd4b8c6b73f6f2944b36b52e954edbd9991ea48d9fde91166ffe338537c666207000bac

  • /data/data/com.dowveeojo.jwecwulpd/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.dowveeojo.jwecwulpd/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    efa93e0acb76269d1839e0c4f6fa4e1b

    SHA1

    71839edeb01aaa2ae5c1b597c5f37c3214c4680c

    SHA256

    78f0b25742eda2c454cbf75e4fda3714d31b458217ecc5d090aee6feb067ebb7

    SHA512

    9dc5355f284ff8dec721c23c4f85e45877cb82315a80a1fa49bc17af1f3ea26794cfca4d3e0e0aee5aae4288dc52364fb83f11fcef1add6d1bbadcaf89c88dd7

  • /data/data/com.dowveeojo.jwecwulpd/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.dowveeojo.jwecwulpd/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    b9fe5d12deeb892a23f564deb43fc66f

    SHA1

    063fb62928697ade50f9d1ebfd1b20b43eb1d436

    SHA256

    ab416c60fcdcc9fae9a52893216f79c1a220b7cabcf409e3676d0b287a67a439

    SHA512

    3a65f670f1716fbe952b93fa6bac00151314d4cc8786e92a9944f4fea3d42cc8cc6a2d8402feb5ded0b83544958fe8d6e3e9eafb036a9470581886f1375d3146

  • /data/data/com.dowveeojo.jwecwulpd/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    1c59fded6b89ee3ffc73dbd7809cf633

    SHA1

    3544d7dfd61165e167edf922034f14a32318a183

    SHA256

    94691e96631655d5fe8c51a527520259fc33c593142498aa98286b9fb3c23acd

    SHA512

    13b44f546fa0a957b26a88c0bddb36a9ff79a36ff2ca9d714218a595e28549afa4fad772172b7fd8c8a42400eee337b19282dcac83ca1562b0706db503b47e28

  • /data/data/com.dowveeojo.jwecwulpd/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    2ac25446456838c46a19b55a6a0c11de

    SHA1

    d4c6b1fd8604dac236eda6004445ae74f530687e

    SHA256

    c8e4e450c740e5ef5bccd0397dfb3fd812fe0859d2737423a691c7fa9c754e8c

    SHA512

    afb26b704780adeaa6e5c5deb53e438ee8f51559a4a613d4856a3a6288e4ac08e9dc63baf233532d2569fa70f524002ea15cb4b0935be0aaa43ae619d589db7f