Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    15-02-2025 22:00

General

  • Target

    0de59148f4252b81b2db533034cca0cc393b58cb85ab8bce8c1ae62d9ea13197.apk

  • Size

    4.8MB

  • MD5

    57cea51ae2f9dd757c3a29254d1408f0

  • SHA1

    a02db3677599c89d451a1570faed6de33e7786f8

  • SHA256

    0de59148f4252b81b2db533034cca0cc393b58cb85ab8bce8c1ae62d9ea13197

  • SHA512

    aa7cd526a1654ff6e1d090edb22d01274d568c2fb601a7de345b1a8b538ac18076ba4e22c92b3e8f04e045d12dc7b4d09e06a2963e90fc781db8ecb6e30285ef

  • SSDEEP

    98304:4wBQqxi0spTtKKRCWVBmBqSC+dgehxN96bemdEIbvhpkXLb/FR24Vl03B:ZBQqxi0spTtKKRCWVBm8GxzQVdEAPkXS

Malware Config

Extracted

Family

hook

C2

http://176.65.134.87

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 22 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.xjqhagprr.ahdckqkzu
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4788

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.xjqhagprr.ahdckqkzu/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    e3786247172eab3ac5e91d9fed6bf09c

    SHA1

    b1e3fe4982211fd8aded1208c75b4d5a81e616df

    SHA256

    821272808f377c9670defd46f956ec0371be2358791b275950fd53267e86d762

    SHA512

    93787d1aa9ac1c336658baa3a7a21868011b0c5432b13e0869120e97a1adacd250361c024a03cd52e8fed5679bcc038e8a10fe924b202afe130731cc7eb02e0d

  • /data/data/com.xjqhagprr.ahdckqkzu/cache/classes.dex

    Filesize

    1.0MB

    MD5

    381b878efdfe711c2abf66329f2c7bbc

    SHA1

    9b34b8f015f429b874be34e1a29bdd1a60b1ec06

    SHA256

    ef66773309a97b548c6f5980d89235861498c6f46e799d217164525e362d5b9b

    SHA512

    98b548f70913c05cbe29d281733cf41077c85174619ec32f32d767f608f0da215909e214007ca95d1d7646c1bc689bf4d0f9deac012af9ed22f88c1b566d71d2

  • /data/data/com.xjqhagprr.ahdckqkzu/cache/classes.zip

    Filesize

    1.0MB

    MD5

    5af085468870685341191bc666193c2e

    SHA1

    9e8ac95c36bef02efb034075fe3985d06cdfb340

    SHA256

    4cdd856c7a7b45beb163ab3265e7bd5c7ca3e3277fdcaa17f3f336532351dae4

    SHA512

    16d21fcc4949b03725d28573c7905f44a23315f86474d321e04dedaa7ce872c0b182983e8c966fa5d00d363c46b71d93f3fb62ed829f6c3e77ed1e9ef76413f3

  • /data/data/com.xjqhagprr.ahdckqkzu/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.xjqhagprr.ahdckqkzu/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    3532b64f5e37b19056d9a80bc4a78195

    SHA1

    d1abad956d7929d2b688554c4f817efb31ee888c

    SHA256

    a882ad4373841f197133cc4f9c1cf2a1aeb96ac259bfa91aa0c46a7cb12a03ba

    SHA512

    f8351dda29ca23ab238a231ac443f0f52d5409b95870ac2cc873f1cdb82c9cb2811838d3a927f20a9569ad480271328a1da9d03a20d82d22ec930a12ff84f4f3

  • /data/data/com.xjqhagprr.ahdckqkzu/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.xjqhagprr.ahdckqkzu/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    559df5ffd03ed5b68167c29303955509

    SHA1

    0825610239b8054135aa20cc675605f630ae08de

    SHA256

    6a3d6c7d0d34af5607d929fdc80b558229bb9423b8dda5a8560d0ca317940395

    SHA512

    65f2da6117116b1fb471921e798d494ae84d9b245781a58efb5443e4442c8300f126543850b73f7bac64f0ce7a4d320eb3c5e5fcc6691f8feac56c4f785b31e3

  • /data/data/com.xjqhagprr.ahdckqkzu/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    49290ea265039d54e839242b32c4f608

    SHA1

    94c5d8451d93c4833845b3b50f51f2a3ae401dd0

    SHA256

    00edc5442885392abebacf27e9145a9a3d2c793f3778d57515038dd8677ca16a

    SHA512

    567f4e14869def489c08dc777596ce742285dedb5200d18a2a9c785e7ad4c6d7733c15aef63fedbc2d89026d9f1c8ad7b22748cc107689d558716804b0c0d0a2

  • /data/data/com.xjqhagprr.ahdckqkzu/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    f7ffc37d013635ad8623b41ad1167268

    SHA1

    92f84b2e440a79d91e275d8705c0d0d5353afe8d

    SHA256

    fe96277778d72eed36dbc79616b152b5b70e7b2a013511a22a26c6faba686878

    SHA512

    c46f28f8947455a95065dbba6c527d87baf9ed7809f862d4280fbeca5c2ece44543aa672017fe3eeb4274059db9901309d9a60cd6909d341e9ab5fd2b639ba64