Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    android-10_x64
  • resource
    android-x64-20240910-en
  • resource tags

    arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system
  • submitted
    17-02-2025 22:13

General

  • Target

    3a936bed2bf52170ef7e39b3b3ab09e301845cbc60f444aef56ddb4bf797f34c.apk

  • Size

    4.8MB

  • MD5

    cab3ecef0b6751e21fb64da391d3be1c

  • SHA1

    eabb983383f949d482349b16f3d757f6e549f2e0

  • SHA256

    3a936bed2bf52170ef7e39b3b3ab09e301845cbc60f444aef56ddb4bf797f34c

  • SHA512

    364a580b8b5f331e5c8ada87cc430cc0c1627184bcc98fe51d59dd4f440ea7a804af2e36e9a21ac2c7ce8ae9879d4fa3659ef593dbdb250a2e9218d049b3f0f9

  • SSDEEP

    98304:/oIyYn7voji+NRqlH+KLOE6rXxNeEzFqmSPiB8erEwrewn0EuHM:ryCojhNROeKSJFqpaB8MEwawXuHM

Malware Config

Extracted

Family

hook

C2

http://176.65.134.87

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.kjshwxnee.dgydkbshs
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:5228

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.kjshwxnee.dgydkbshs/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    7f30461529769003f2b40661acea0905

    SHA1

    818f32bd10ced77f34355d68ea41e62cf692581a

    SHA256

    66173302822f2fa2149989764dbd7cee5e94e5dda77e13a89c4f1e94eb44a902

    SHA512

    2a0f9ebfb7ceb8112b9249cdc4f8b27b34954bfe81f6c303c11b7e96a8bd34d27545ce6e6078b68831d74a70c9b153dc38e6b755da2bb9164a05c87846c28038

  • /data/data/com.kjshwxnee.dgydkbshs/cache/classes.dex

    Filesize

    1.0MB

    MD5

    a45c14deecf5fe738981f61f9fe51a09

    SHA1

    e4b33aa1317b034a98e1b4965013445cb5705317

    SHA256

    2f8021c0d8794e6d937e3bcb3f4a11ba35ec8e7db9b84d9f8b121e314b16d88f

    SHA512

    1e4072ba636d33371917c59d5c119a7c34635a052873acd8686f354e146188642da44d8540acafacca9695fc5869c8712fb1f351c8b28687dd12e1ece79e7113

  • /data/data/com.kjshwxnee.dgydkbshs/cache/classes.zip

    Filesize

    1.0MB

    MD5

    1531bd58ad840bd1869f33c31b5a6713

    SHA1

    12f6bfac66fe4fe662ad213d2f4888cc85b852df

    SHA256

    67e0287013431d10b75f9c0b523cae4ded201c4e63de383200e4df1f6e061ef5

    SHA512

    afb872e53e0137a4ce7f73a54b5b4c89efd8482d98597ec2593c374a9a458a5613c08c5501cada9f4cd96730ad999f6318394e50aabf60dbd791f7f928f3e4f1

  • /data/data/com.kjshwxnee.dgydkbshs/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.kjshwxnee.dgydkbshs/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    bd3ba03b08e83b1e8fbeaa8b2fb523a4

    SHA1

    cd840ac8499562bac9b838529d9c0c072549641e

    SHA256

    d8b08f50c197693ae621a051f57383584862c1024fb169f73d4558638aa84051

    SHA512

    131b2823af99ce200b99b7c10c7b6d730c18b067a2d8e5efb4333d02a9b87283a185e92ac88eb2dd20c45893557059e0af3e9f7bed41da9dcce1a693fd59e723

  • /data/data/com.kjshwxnee.dgydkbshs/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.kjshwxnee.dgydkbshs/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    295a84d0096d64da5ead9ad3228cd2be

    SHA1

    bd79978cd0de8dd8add5276830cc8de3008cbb02

    SHA256

    674ad158118927f5732a73e2b1548590b37991792e5c757133024b3c673de442

    SHA512

    a848c47712ce1aee0d9e13524e257c0cbd1ee21aea257915202ba58c85b0299b58b6415e3ccf202395b7c444446d9d48b7e23825259b98a46d0ed43fb3d3e36a

  • /data/data/com.kjshwxnee.dgydkbshs/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    d76b0f51fa49a6edf4660aae1a86eeba

    SHA1

    d214598db5bbdd28bde4855e0133637796e27da3

    SHA256

    2e607d82a79e6cfab13351268f99881a5e8e4b141e117429f7342c387eb20711

    SHA512

    c9b5c939d6830790c4493879454832a9296b97e83754631b5c706487dd0013e0223b6a66b818a1e53bcaadad836c46329845e94a0d3692e9d1631b475df66ba7

  • /data/data/com.kjshwxnee.dgydkbshs/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    2a951227dc9ceb0e70806a0b8609c2e0

    SHA1

    1ccaee1876c1e7278d701c835295d17314cacfff

    SHA256

    83fef76319da22aa701a9aa99f32630f160922c4784f9dababc2600b973458af

    SHA512

    45f78b2d98ef8242042ff695096798af345dd641005643948833246769fa675116a0eb0c63f49548dd38c723261eaa76f86015ea71fbe782877747b582d30e0f