Analysis

  • max time kernel
    137s
  • max time network
    153s
  • platform
    android_x64
  • resource
    android-x64-20240624-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system
  • submitted
    15-02-2025 22:00

General

  • Target

    0de59148f4252b81b2db533034cca0cc393b58cb85ab8bce8c1ae62d9ea13197.apk

  • Size

    4.8MB

  • MD5

    57cea51ae2f9dd757c3a29254d1408f0

  • SHA1

    a02db3677599c89d451a1570faed6de33e7786f8

  • SHA256

    0de59148f4252b81b2db533034cca0cc393b58cb85ab8bce8c1ae62d9ea13197

  • SHA512

    aa7cd526a1654ff6e1d090edb22d01274d568c2fb601a7de345b1a8b538ac18076ba4e22c92b3e8f04e045d12dc7b4d09e06a2963e90fc781db8ecb6e30285ef

  • SSDEEP

    98304:4wBQqxi0spTtKKRCWVBmBqSC+dgehxN96bemdEIbvhpkXLb/FR24Vl03B:ZBQqxi0spTtKKRCWVBm8GxzQVdEAPkXS

Malware Config

Extracted

Family

hook

C2

http://176.65.134.87

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.xjqhagprr.ahdckqkzu
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4933

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.xjqhagprr.ahdckqkzu/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    e3786247172eab3ac5e91d9fed6bf09c

    SHA1

    b1e3fe4982211fd8aded1208c75b4d5a81e616df

    SHA256

    821272808f377c9670defd46f956ec0371be2358791b275950fd53267e86d762

    SHA512

    93787d1aa9ac1c336658baa3a7a21868011b0c5432b13e0869120e97a1adacd250361c024a03cd52e8fed5679bcc038e8a10fe924b202afe130731cc7eb02e0d

  • /data/data/com.xjqhagprr.ahdckqkzu/cache/classes.dex

    Filesize

    1.0MB

    MD5

    381b878efdfe711c2abf66329f2c7bbc

    SHA1

    9b34b8f015f429b874be34e1a29bdd1a60b1ec06

    SHA256

    ef66773309a97b548c6f5980d89235861498c6f46e799d217164525e362d5b9b

    SHA512

    98b548f70913c05cbe29d281733cf41077c85174619ec32f32d767f608f0da215909e214007ca95d1d7646c1bc689bf4d0f9deac012af9ed22f88c1b566d71d2

  • /data/data/com.xjqhagprr.ahdckqkzu/cache/classes.zip

    Filesize

    1.0MB

    MD5

    5af085468870685341191bc666193c2e

    SHA1

    9e8ac95c36bef02efb034075fe3985d06cdfb340

    SHA256

    4cdd856c7a7b45beb163ab3265e7bd5c7ca3e3277fdcaa17f3f336532351dae4

    SHA512

    16d21fcc4949b03725d28573c7905f44a23315f86474d321e04dedaa7ce872c0b182983e8c966fa5d00d363c46b71d93f3fb62ed829f6c3e77ed1e9ef76413f3

  • /data/data/com.xjqhagprr.ahdckqkzu/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.xjqhagprr.ahdckqkzu/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    0485548a07386c851ed020b44b063eb1

    SHA1

    a7d44f5870a1bbfa357d1b687aac79215d831cd0

    SHA256

    1ecc0751d1f20d966fd1cbf43493161ac9181ce427f50a802196ec22db31b548

    SHA512

    4003eeaf32f5c6222d62224cbff69267ca8c7129d21331e51dd57b4e564b77a0b2be8b4ba7803d4a2f22c0f37b236f273effdfa4c223e1e5422044bce02ed05d

  • /data/data/com.xjqhagprr.ahdckqkzu/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.xjqhagprr.ahdckqkzu/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    2203587a971af999b47688cbe00b1a69

    SHA1

    37ccaa04ae7289fca3e9b9ad0c56b3e18df38950

    SHA256

    3d6c6707d99a21f7796a28b531096bf6d7d753579b165b138d03cda0f2323786

    SHA512

    4e75881cc501dc4829a5c6827208194a01ac23a675b8a91f091eb98897ee342cc757bdc8b89d16229eea8c1c3756a0334075da42f771463a060357f30a3bddb8

  • /data/data/com.xjqhagprr.ahdckqkzu/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    205d5c24d99ece79ca0e9771510ca1b8

    SHA1

    38b46d9bb6597b668d67e49ec071df74467a0396

    SHA256

    fc74a4fca267c0fd7d3dbaf9dcff994f61320a8ffd67fb037599f4c5d8f6d9b0

    SHA512

    6e78383bf54adf922ff3a0dbd4afedce7055aaef23e4a696d836ca90da415155568d14bda200b231b5ceb54c15c1d018ffa9f96ba1cefae9eb782e0cc3023263

  • /data/data/com.xjqhagprr.ahdckqkzu/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    20daf0e415f28a18f9f417d26c1098ab

    SHA1

    ebcba07163c4168adb836fe3d3d8c2f0f789aef0

    SHA256

    3fbdf338ab91ef7a032e02ec122d05d1766bce6a7d27a7c3fbf1f7d1c5fd0f11

    SHA512

    92dfaecd897f10fdae49962e23894f9fbe12d3bc6a0c56b0a0e1df484679a509fb8b1c73c1ee2021f12bc1f7d9c6515ba6e0aa73b3b7dc003842cb221ba629cb