Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    17-02-2025 22:13

General

  • Target

    3a936bed2bf52170ef7e39b3b3ab09e301845cbc60f444aef56ddb4bf797f34c.apk

  • Size

    4.8MB

  • MD5

    cab3ecef0b6751e21fb64da391d3be1c

  • SHA1

    eabb983383f949d482349b16f3d757f6e549f2e0

  • SHA256

    3a936bed2bf52170ef7e39b3b3ab09e301845cbc60f444aef56ddb4bf797f34c

  • SHA512

    364a580b8b5f331e5c8ada87cc430cc0c1627184bcc98fe51d59dd4f440ea7a804af2e36e9a21ac2c7ce8ae9879d4fa3659ef593dbdb250a2e9218d049b3f0f9

  • SSDEEP

    98304:/oIyYn7voji+NRqlH+KLOE6rXxNeEzFqmSPiB8erEwrewn0EuHM:ryCojhNROeKSJFqpaB8MEwawXuHM

Malware Config

Extracted

Family

hook

C2

http://176.65.134.87

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Reads information about phone network operator. 1 TTPs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.kjshwxnee.dgydkbshs
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4591

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.kjshwxnee.dgydkbshs/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    7f30461529769003f2b40661acea0905

    SHA1

    818f32bd10ced77f34355d68ea41e62cf692581a

    SHA256

    66173302822f2fa2149989764dbd7cee5e94e5dda77e13a89c4f1e94eb44a902

    SHA512

    2a0f9ebfb7ceb8112b9249cdc4f8b27b34954bfe81f6c303c11b7e96a8bd34d27545ce6e6078b68831d74a70c9b153dc38e6b755da2bb9164a05c87846c28038

  • /data/data/com.kjshwxnee.dgydkbshs/cache/classes.dex

    Filesize

    1.0MB

    MD5

    a45c14deecf5fe738981f61f9fe51a09

    SHA1

    e4b33aa1317b034a98e1b4965013445cb5705317

    SHA256

    2f8021c0d8794e6d937e3bcb3f4a11ba35ec8e7db9b84d9f8b121e314b16d88f

    SHA512

    1e4072ba636d33371917c59d5c119a7c34635a052873acd8686f354e146188642da44d8540acafacca9695fc5869c8712fb1f351c8b28687dd12e1ece79e7113

  • /data/data/com.kjshwxnee.dgydkbshs/cache/classes.zip

    Filesize

    1.0MB

    MD5

    1531bd58ad840bd1869f33c31b5a6713

    SHA1

    12f6bfac66fe4fe662ad213d2f4888cc85b852df

    SHA256

    67e0287013431d10b75f9c0b523cae4ded201c4e63de383200e4df1f6e061ef5

    SHA512

    afb872e53e0137a4ce7f73a54b5b4c89efd8482d98597ec2593c374a9a458a5613c08c5501cada9f4cd96730ad999f6318394e50aabf60dbd791f7f928f3e4f1

  • /data/data/com.kjshwxnee.dgydkbshs/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.kjshwxnee.dgydkbshs/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    0da08f2684ba695c79690e7caa7d9066

    SHA1

    a6e8a4ca95bcb468a39d13dd186e756e65ad6ad6

    SHA256

    bd6cce562b9add1ce7ed48c37d70d6939d1d398ebddb7ec53c0eb4c91ae037fa

    SHA512

    645ff19dc858308cd6633d50f3ea12c00a57018f72edfc5054b490714e6d3083d1ebea93e120102aefc392e7afa149d1daf9b398a4ee5e1c35af25da6edc88cd

  • /data/data/com.kjshwxnee.dgydkbshs/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.kjshwxnee.dgydkbshs/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    f3b3f209d350b75cc3cc59afed2aedc6

    SHA1

    e377a518e3311c664374d9f9ca0b7610f3b36759

    SHA256

    77f6bb411de2c107e64aa291f0d78c7bcfc565a071b3f05977be9109909b2353

    SHA512

    c274428f9718fa17db208d56b90463350d630fedfbe8ecf9e8ceca28d2096df62058b379b8cda20430ab35ccfa05d820b730c7fa36ba98e200d904a48aa8f2a5

  • /data/data/com.kjshwxnee.dgydkbshs/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    2ebf7c13066285809078caa73f658441

    SHA1

    ad66a33edf6ee0a64b4d8db824dcdedb8580ec57

    SHA256

    8154c1354ac04ebeec56e3b2f4fd73008d373309d1a19249b4127e28d7d5676d

    SHA512

    92ff20104a284d7bb6a6a72a91bd0c524a10aa1c4d05f48907c65b127b56e3d82e0aa59b55f13f197761a8800e6cde9fefe1f222f2c25a45adbbc556d98609b7

  • /data/data/com.kjshwxnee.dgydkbshs/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    44125ef788f246d1094251b057ca331d

    SHA1

    e7f8d9e9f22d07c1d6d28f80e2b2faffc4b7a662

    SHA256

    5522ae5f87c9877dd500e17b6ee6af1b5e1aed64af702421d638494d647fc709

    SHA512

    5d856b6d2a07fd1dfef1140615076826864ba94fd1b2ff091f04f71aeaf7b54ea3a65206cc37cb760056ed1e513f602a2415d70f8fec7e5e80b17741ede72613