General

  • Target

    461667544a618419230b256af9d682bce6c3238977bcc48144015f47c9550b74.apk

  • Size

    3.7MB

  • Sample

    230213-lxmdxabg8t

  • MD5

    de61a04de576bfedceaf777d00c681e3

  • SHA1

    ad76e12bfafe8e2c837259793a8aa8adc69ad55a

  • SHA256

    461667544a618419230b256af9d682bce6c3238977bcc48144015f47c9550b74

  • SHA512

    eb4b7b68843850e7d9d3e22870f28e5992e2ea3224640388d47180737c970a7fe3481633175d64f176cc281d33cfc8932b1a3a7852fdf98e5ce9d9d92bfa6980

  • SSDEEP

    49152:ZcRgbYP8p8FETgu749/zzgzO4h2YEhs/o1ZIa4zxIOnJMkSWrq3/PHOOK+lMyfsH:ZcRgbYUIfb9rU8YSJ99MKVZRiyfsIMbt

Malware Config

Extracted

Family

hook

C2

http://45.93.201.92:3434

AES_key

Targets

    • Target

      461667544a618419230b256af9d682bce6c3238977bcc48144015f47c9550b74.apk

    • Size

      3.7MB

    • MD5

      de61a04de576bfedceaf777d00c681e3

    • SHA1

      ad76e12bfafe8e2c837259793a8aa8adc69ad55a

    • SHA256

      461667544a618419230b256af9d682bce6c3238977bcc48144015f47c9550b74

    • SHA512

      eb4b7b68843850e7d9d3e22870f28e5992e2ea3224640388d47180737c970a7fe3481633175d64f176cc281d33cfc8932b1a3a7852fdf98e5ce9d9d92bfa6980

    • SSDEEP

      49152:ZcRgbYP8p8FETgu749/zzgzO4h2YEhs/o1ZIa4zxIOnJMkSWrq3/PHOOK+lMyfsH:ZcRgbYUIfb9rU8YSJ99MKVZRiyfsIMbt

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Makes use of the framework's Accessibility service.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Removes its main activity from the application launcher

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks