Analysis
-
max time kernel
147s -
max time network
148s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
27-01-2025 22:01
Static task
static1
Behavioral task
behavioral1
Sample
2230b07509c83a77e68f9372b45ec15babca356adaaca685453a611961570990.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
2230b07509c83a77e68f9372b45ec15babca356adaaca685453a611961570990.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
2230b07509c83a77e68f9372b45ec15babca356adaaca685453a611961570990.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
2230b07509c83a77e68f9372b45ec15babca356adaaca685453a611961570990.apk
-
Size
3.4MB
-
MD5
1809ee1fb25caddb137ff598d2806899
-
SHA1
5fd4e75ebd937da2084a32f66d928a69491fb632
-
SHA256
2230b07509c83a77e68f9372b45ec15babca356adaaca685453a611961570990
-
SHA512
b750bc1e8caa370f572171e79e13b54dd89732dc97881705ab5f524ec6a3ad32226ba36987bb03001d2f8482e97e17f21a2b08810f9eb96e8f58db8087c6151a
-
SSDEEP
98304:8pqvVbCHubZtW/s8nH7uRCa4+w1fzgiue7m8e2iF9cM:DbxtmyK5fzgiiN4M
Malware Config
Extracted
hook
http://154.216.17.69
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.fcldkxzxd.ujzezjrld/app_dex/classes.dex 4391 com.fcldkxzxd.ujzezjrld /data/user/0/com.fcldkxzxd.ujzezjrld/app_dex/classes.dex 4415 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.fcldkxzxd.ujzezjrld/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.fcldkxzxd.ujzezjrld/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.fcldkxzxd.ujzezjrld/app_dex/classes.dex 4391 com.fcldkxzxd.ujzezjrld -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.fcldkxzxd.ujzezjrld Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.fcldkxzxd.ujzezjrld Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.fcldkxzxd.ujzezjrld -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.fcldkxzxd.ujzezjrld -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.fcldkxzxd.ujzezjrld -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.fcldkxzxd.ujzezjrld -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fcldkxzxd.ujzezjrld android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fcldkxzxd.ujzezjrld android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fcldkxzxd.ujzezjrld android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fcldkxzxd.ujzezjrld android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fcldkxzxd.ujzezjrld -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.fcldkxzxd.ujzezjrld -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.fcldkxzxd.ujzezjrld -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.fcldkxzxd.ujzezjrld -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.fcldkxzxd.ujzezjrld -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.fcldkxzxd.ujzezjrld -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.fcldkxzxd.ujzezjrld -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.fcldkxzxd.ujzezjrld
Processes
-
com.fcldkxzxd.ujzezjrld1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4391 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.fcldkxzxd.ujzezjrld/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.fcldkxzxd.ujzezjrld/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4415
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD53b6bd8b263a3596c92ea5e0100ddb282
SHA11adec583d29442dc21e696b92e5daa2c5afb89b8
SHA2569afb0000c924ed1efc853ac3640fc22c50bad711d9c498696ddf042a4b75bcab
SHA512c1c3aaea9e23891e7d73e76d07d7f0aa0b790247eea710ee8cc02acd82758240ec7d9474d29910b8a47ae3bb0c32e27cad05732bf76e1c3de17a2a0e6ad45e72
-
Filesize
1.0MB
MD5e61b1a3e1b60614abac1524192858b32
SHA1bae80815cfcaf6d2c9336ae63ce075a3af2dd76e
SHA256fa5271dfef3bdd4fed6e694e994849fff56144ce4ef390439c870639cad98d51
SHA512fac2e68bbebe19352fabc76d1fbc318f6bf2bec5b3bdad25fe7ebb78cd8d4684d4364bcdbc245851817900d2e95a73d85069881bc1f18c1b273668bddaed428a
-
Filesize
1.0MB
MD588718e6e42d2c367f20b4da97bd2ccc5
SHA15cd4166a512d76a73d948517339718bea85b44c9
SHA256e4320f207d87e59b80581ab034361f8f71953ac216adb732743e0df1e278a005
SHA5125e8ec1cdd1e7fe820e1cadb7b08e19697a0b787088bf5d50d8c9d3c5a2eb3dab81717aac97510824f56997b0bc75e0665fc0e7b970af861fab68d480d539e455
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5c7d7a30d4065420c3d7b93d153cfa9a3
SHA11bc772c9cb6a9b3a3ff27ee46b4dd771764678b0
SHA256394d9e20984c6678feb068051cbd9309030a18d590669b6e642f42a851208186
SHA512697f2286bbf1dc571f5caaa70eece4529f28a84edfd2b00fc447cfe2747b216312e1196bde369ad06c9adff6d96cdbd18ca28bb4c06f9b084f31dc2a2a668c3d
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
108KB
MD572b62fa553e1238bcd6d1b1a460dd702
SHA19aa387ed65a06f73177c531c0b204615ea389752
SHA25607d9dc8dfa64f0dad5617ea53838bf99a883d9983ae5931fa1d80ccab5cad56f
SHA51229eae253ed7419b108e2fcfe80d9f50184432a7ae3382d3937a32470ccd6610e366da2da495550f8d65c6742e8a375142b114d16fc392620e0200109867ff3dd
-
Filesize
173KB
MD54c653d21a8a4f66aca4b17db4cdbf9d0
SHA149e70bae81f2aeb0d2313076078c36b6fa8248e1
SHA25653b2998163fdef9b6785bbdf850d1f23692161cf91caeed99cccc2770acb2a5c
SHA5129433a3d70b6fdcfa8c1426dc015d3a4b9dc486c54c4306d54a2f687b03fd85631e4710959c3fde0aa736d7d67b599748809888a2dcd6da07a380bedd10051071
-
Filesize
16KB
MD56650d1b058793f304e08133e83b29dd4
SHA109ba2ee5e2ad0d36586e36fb74d397450b1c0574
SHA25698bf3c04a128d8d10ef6699ec1e5a5ef6e1c76e719fc5a540a2295e9748c39cc
SHA512ee1e7334ee9f855b570622a5e8486e8f2cfab4ddf421ea4b8ef0019edcbf814fb1bca2c7208f2277078c2414b4cdebe55ae611413e38ef1227ecaa92540afe05
-
Filesize
2.9MB
MD5633dbc3121d5892834d9d6ea4b8167bb
SHA1267bb85e999a9f51dcc2c7d2ad0de0244472d055
SHA2569121ec45419131508bf6fdb9150d6e864c29ff76d6450f8967711ac9edae317c
SHA512048f7a11b31b5124fa9ecec11a1be3d2bc3a5995a8f50024d68bc6b6866af1a1c47882ed6f000d7bf4a1e3bd18ee242f9a7d1f0abd8c1d6bcf94c87dde2229f0