Analysis
-
max time kernel
148s -
max time network
151s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
19-01-2025 22:07
Static task
static1
Behavioral task
behavioral1
Sample
4dbbdd9d7bd571da76c225d2038bee65a390f4bb6954f6bc1f73733ac4a7c183.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
4dbbdd9d7bd571da76c225d2038bee65a390f4bb6954f6bc1f73733ac4a7c183.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
4dbbdd9d7bd571da76c225d2038bee65a390f4bb6954f6bc1f73733ac4a7c183.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
4dbbdd9d7bd571da76c225d2038bee65a390f4bb6954f6bc1f73733ac4a7c183.apk
-
Size
4.9MB
-
MD5
cc785ad1712c11c235c733aa68268b20
-
SHA1
9a2bbc4ed6df4f1ca06a9e3349afb280270a64f7
-
SHA256
4dbbdd9d7bd571da76c225d2038bee65a390f4bb6954f6bc1f73733ac4a7c183
-
SHA512
f9c3704e22658f1610795de501d03332acaf28b87ef43b9927b67ffacb942c911ff8182ab389d6324762e0165d190d879d1e6bf5a4d31a57dbc4e62df1a6e8dd
-
SSDEEP
98304:FrfB4DvmW6Qan0U1k4fS0XddGbZbFkxGr2yS1jGvU16nPH4xRmldeeIvN:dGvmpBn0eDfBtdGlbFkkax12PH4xRmle
Malware Config
Extracted
hook
http://154.216.17.69
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.tstimtsbu.ymkbnwzwz/app_dex/classes.dex 4763 com.tstimtsbu.ymkbnwzwz /data/user/0/com.tstimtsbu.ymkbnwzwz/app_dex/classes.dex 4763 com.tstimtsbu.ymkbnwzwz -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tstimtsbu.ymkbnwzwz Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.tstimtsbu.ymkbnwzwz Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.tstimtsbu.ymkbnwzwz -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.tstimtsbu.ymkbnwzwz -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.tstimtsbu.ymkbnwzwz -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.tstimtsbu.ymkbnwzwz -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.tstimtsbu.ymkbnwzwz -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tstimtsbu.ymkbnwzwz android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tstimtsbu.ymkbnwzwz android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tstimtsbu.ymkbnwzwz android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tstimtsbu.ymkbnwzwz android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tstimtsbu.ymkbnwzwz -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.tstimtsbu.ymkbnwzwz -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.tstimtsbu.ymkbnwzwz -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.tstimtsbu.ymkbnwzwz -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.tstimtsbu.ymkbnwzwz -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.tstimtsbu.ymkbnwzwz
Processes
-
com.tstimtsbu.ymkbnwzwz1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4763
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD580f47c4b9c3d93ffc28f976a5436c54f
SHA1c30196370434909e42f13da01fc07cc282848a91
SHA256a1f61e5fbe9a335eae7161ceb22d8a5a665cc07157c438b4880a0e7be1eac6ee
SHA5120366164aa8613d78e7c68d2489a7ea31d81c7ba8f0146edbc6da6ab7604341910ceac89b1a061a67e1036e2c22123679aa2f115e5659689c4308145015434fb1
-
Filesize
1.0MB
MD50c85a9d2c666968cb40b693065e8cd64
SHA103c044b3e85028fb42dfa99d83aa83f7bd2115f9
SHA25614fd89367e2608f5dcc550195866696d5e5984bad72745517988c7a9c04a0b24
SHA512f7682a419d268a8135719e573b6fbf64a223edd75c3c3233c12791a015c4bca842c7f2938006d5115c49e392c8cb189589acbc3312d7df526742a5cd580c035d
-
Filesize
1.0MB
MD59f1379113d1f0a3ba786bf88a6e5582c
SHA1acbba06ee7f56fe4acfc064fe4c5f802b1136a76
SHA2562f18994a79176a822aceece2bfa7442206a064d719760b92ceb538d5f12a3c4e
SHA51247c224a21c510b131602984818920324ada3f8f95c5d1f84e87e3711066cb30decc54f5644d372548f8879464452496a4ec2eefdca65dbb3a737706b1fcde438
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD5d7d6b047eead0d20777bcc1ad5ed5fc7
SHA1da0bdf91c6f2bc4f0176cf3a64d7874614f884b9
SHA2565825b8b7b26bf9e3065fa009ffdd74204bd303754ab6c23c2e8a7d8de66e9ed3
SHA5122ca4078567f0005bb0116277c17e00fe05e0e798b64ec7d74275644e0467aee5713abebc90655572035546f4d2a9fe41f6a36c4e08e7ee0672e85e23b9863c81
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD59f93f1ee71a14d70f13c7ed243c9ad85
SHA151f8ef4c9f9ff1c3dcb977825f9641d16f17dc72
SHA256e7832a621c58e71b05a449c1808cc5cf6358f27d58ddbf8679e3ab930b632ab0
SHA5124718215ae4a50b40a985b63d4ab5c18015c33c7e9247d7b3a232d74baf5d541bc974cac8c3f9f790b0e0c8d02492ba0d91b103e89d90f0255efa3152579b76d9
-
Filesize
108KB
MD58d42420601821d3a238eda87ba7fe410
SHA152d08e4dde0b407f3e154dc74619a715546278df
SHA25674b2d9a4c5aed8d862e98e61f5d239eb40adf1038c373b60e1139b9f89858360
SHA512dfac6c62030cdc340ac90165321931e55eeffe5ee7a443fde0977473457c07a5cef91bf97a8a54e4c5ae913dc088e101a508ed89d0d7ce9397f0464271be7969
-
Filesize
173KB
MD5e406bf6287b3842b8deb962f65e236e0
SHA161dc05f578f48000541745de1142648c2134f6b9
SHA256982f623e6b144d5d703cddcc2e8c360081e97d36abf270354022de402e623e85
SHA51297352e28b5cae8014a48d99b2681dfd131d329b281293029c0b9006be421361f3b36e9a25c1d21264945f149bb58dedf62033e4b68a6a785221690842bea373d