General

  • Target

    Test-GoldenCrypt_1.apk

  • Size

    3.7MB

  • Sample

    230205-arvmjsfc42

  • MD5

    ad1c9280e2720887e64602d87a1cf122

  • SHA1

    672014038e4aea7eeeafbc289b7538e887ab96fe

  • SHA256

    5ee21b2ad8525277035379d8c96e9aade1b6cc2f41e4877380033c00e8710686

  • SHA512

    dbf91c21f717e04eabea4eda52329691354cedd049a90839f443e2ad5b69d0b0db92106cd0ae14bec4c268daed5766993a50d6b965eee66ef11f3ea0e6929395

  • SSDEEP

    49152:zX6Zo1QPKzvMSjjajd3q/mZ0SWrqf/5uVuM7aaDUm3QBe7kkT/ZjmPsT+9HLisxC:zXkkGstkU/CpsVuM+at3Qo7PThj+EV

Malware Config

Extracted

Family

hook

C2

http://5.42.199.22:3434

AES_key

Targets

    • Target

      Test-GoldenCrypt_1.apk

    • Size

      3.7MB

    • MD5

      ad1c9280e2720887e64602d87a1cf122

    • SHA1

      672014038e4aea7eeeafbc289b7538e887ab96fe

    • SHA256

      5ee21b2ad8525277035379d8c96e9aade1b6cc2f41e4877380033c00e8710686

    • SHA512

      dbf91c21f717e04eabea4eda52329691354cedd049a90839f443e2ad5b69d0b0db92106cd0ae14bec4c268daed5766993a50d6b965eee66ef11f3ea0e6929395

    • SSDEEP

      49152:zX6Zo1QPKzvMSjjajd3q/mZ0SWrqf/5uVuM7aaDUm3QBe7kkT/ZjmPsT+9HLisxC:zXkkGstkU/CpsVuM+at3Qo7PThj+EV

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Makes use of the framework's Accessibility service.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Removes its main activity from the application launcher

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks