Analysis
-
max time kernel
148s -
max time network
150s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
19-01-2025 22:07
Static task
static1
Behavioral task
behavioral1
Sample
4dbbdd9d7bd571da76c225d2038bee65a390f4bb6954f6bc1f73733ac4a7c183.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
4dbbdd9d7bd571da76c225d2038bee65a390f4bb6954f6bc1f73733ac4a7c183.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
4dbbdd9d7bd571da76c225d2038bee65a390f4bb6954f6bc1f73733ac4a7c183.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
4dbbdd9d7bd571da76c225d2038bee65a390f4bb6954f6bc1f73733ac4a7c183.apk
-
Size
4.9MB
-
MD5
cc785ad1712c11c235c733aa68268b20
-
SHA1
9a2bbc4ed6df4f1ca06a9e3349afb280270a64f7
-
SHA256
4dbbdd9d7bd571da76c225d2038bee65a390f4bb6954f6bc1f73733ac4a7c183
-
SHA512
f9c3704e22658f1610795de501d03332acaf28b87ef43b9927b67ffacb942c911ff8182ab389d6324762e0165d190d879d1e6bf5a4d31a57dbc4e62df1a6e8dd
-
SSDEEP
98304:FrfB4DvmW6Qan0U1k4fS0XddGbZbFkxGr2yS1jGvU16nPH4xRmldeeIvN:dGvmpBn0eDfBtdGlbFkkax12PH4xRmle
Malware Config
Extracted
hook
http://154.216.17.69
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.tstimtsbu.ymkbnwzwz/app_dex/classes.dex 5134 com.tstimtsbu.ymkbnwzwz /data/user/0/com.tstimtsbu.ymkbnwzwz/app_dex/classes.dex 5134 com.tstimtsbu.ymkbnwzwz -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tstimtsbu.ymkbnwzwz Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.tstimtsbu.ymkbnwzwz Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.tstimtsbu.ymkbnwzwz -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.tstimtsbu.ymkbnwzwz -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.tstimtsbu.ymkbnwzwz -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.tstimtsbu.ymkbnwzwz -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.tstimtsbu.ymkbnwzwz -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tstimtsbu.ymkbnwzwz android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tstimtsbu.ymkbnwzwz android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tstimtsbu.ymkbnwzwz android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tstimtsbu.ymkbnwzwz android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tstimtsbu.ymkbnwzwz -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.tstimtsbu.ymkbnwzwz -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.tstimtsbu.ymkbnwzwz -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.tstimtsbu.ymkbnwzwz -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.tstimtsbu.ymkbnwzwz -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.tstimtsbu.ymkbnwzwz -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.tstimtsbu.ymkbnwzwz -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.tstimtsbu.ymkbnwzwz
Processes
-
com.tstimtsbu.ymkbnwzwz1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:5134
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD580f47c4b9c3d93ffc28f976a5436c54f
SHA1c30196370434909e42f13da01fc07cc282848a91
SHA256a1f61e5fbe9a335eae7161ceb22d8a5a665cc07157c438b4880a0e7be1eac6ee
SHA5120366164aa8613d78e7c68d2489a7ea31d81c7ba8f0146edbc6da6ab7604341910ceac89b1a061a67e1036e2c22123679aa2f115e5659689c4308145015434fb1
-
Filesize
1.0MB
MD50c85a9d2c666968cb40b693065e8cd64
SHA103c044b3e85028fb42dfa99d83aa83f7bd2115f9
SHA25614fd89367e2608f5dcc550195866696d5e5984bad72745517988c7a9c04a0b24
SHA512f7682a419d268a8135719e573b6fbf64a223edd75c3c3233c12791a015c4bca842c7f2938006d5115c49e392c8cb189589acbc3312d7df526742a5cd580c035d
-
Filesize
1.0MB
MD59f1379113d1f0a3ba786bf88a6e5582c
SHA1acbba06ee7f56fe4acfc064fe4c5f802b1136a76
SHA2562f18994a79176a822aceece2bfa7442206a064d719760b92ceb538d5f12a3c4e
SHA51247c224a21c510b131602984818920324ada3f8f95c5d1f84e87e3711066cb30decc54f5644d372548f8879464452496a4ec2eefdca65dbb3a737706b1fcde438
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5bc48d9327bf2c3b7b8f415fea12cfd54
SHA149a9cc9250894384daede8c7547c00fc5281cb9b
SHA256ffec419bb5f35a7f8ed8958db7583e11fe19fa72e6a03bd56577d0c10602fb36
SHA51297631cba4e842c3c47158d1d20d17c2d94d07521e2699045968fa30190c1a1d22bd269bdc14947aaa9f6d4c6309f4b04daa19cc7a438f10fb4f95eb2238738ab
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD50f4c341425a7588120310a9529b4300b
SHA1cc83eec520eafd975839970b57707aa77a751ad9
SHA2568bd13b1d7f32996c3014c50ff0f3739642fd6dfb525fc26ec075bfb9c49f5958
SHA5128008ec9d8c87fcd9d74279f33124412009305f93cef73df009219ff4efee4a8ffacffdb472ed498ecb0c99b1b19ddccdbc8c2bcf3253d7bcd9d2c4d21d5fd855
-
Filesize
108KB
MD53276e423d1ba2eb14f6c3d65dbba1948
SHA1ee86b751ac2a49f22fbf562826a96b7b585bf6a6
SHA2568d7d098659bdacebad5062dfb749adb0b9295e0050e950c9764488c891c20b84
SHA512cd39e0ee5c9dea486f6170fa73c93bac3928e49d674e29a343c839bdfc79966d8624cdb8b7ea501a3f97c3e30215c627e19b77fb91816c4199ab6c0385686cc1
-
Filesize
173KB
MD5963e688e15e509eb1c716caf32965a53
SHA16978736d21a36b036d7239f07ae95f05663d4ce2
SHA25668d1feca23a57033f84bf47dbb1338713f1fc8d9901f846b76902b6d8f7b6acc
SHA5128d8449a71b85ac431e7491259a99737787826a0a89778904c79997b52c24f2a5970b677338cbcfd6931aacff9980d4c015f2fc3a864cd21cd7d921cf7595c5b1