General

  • Target

    93AEAFE9E0507E8B1CD2BA4910506F2540B8569EAB9D905B2BF854A3822BCBAC.apk

  • Size

    1.7MB

  • Sample

    231130-v6jttafb9y

  • MD5

    781a885c06ddadc9af79ee6e29692343

  • SHA1

    1c689daa60597faf80128d4f2c091769b442b14b

  • SHA256

    93aeafe9e0507e8b1cd2ba4910506f2540b8569eab9d905b2bf854a3822bcbac

  • SHA512

    f164a3e842ee34ab821e4dc1a3d07fd31098ba7253349c73d71521ea3497e62f195a9302e2b55a64add84c78460947822198be2c681b1e48de1ff4893b246cd9

  • SSDEEP

    24576:llrXiRyMkn0nJkqEAo++iHTy/wyKlW+v43KKP6Pq7jZ1aeAn8gSN4JS6LtuCZ/O:TiRHnJ0AoCCKX19g3VJgSuJS6RuoO

Malware Config

Extracted

Family

hook

C2

http://194.33.191.250:3434

AES_key

Targets

    • Target

      93AEAFE9E0507E8B1CD2BA4910506F2540B8569EAB9D905B2BF854A3822BCBAC.apk

    • Size

      1.7MB

    • MD5

      781a885c06ddadc9af79ee6e29692343

    • SHA1

      1c689daa60597faf80128d4f2c091769b442b14b

    • SHA256

      93aeafe9e0507e8b1cd2ba4910506f2540b8569eab9d905b2bf854a3822bcbac

    • SHA512

      f164a3e842ee34ab821e4dc1a3d07fd31098ba7253349c73d71521ea3497e62f195a9302e2b55a64add84c78460947822198be2c681b1e48de1ff4893b246cd9

    • SSDEEP

      24576:llrXiRyMkn0nJkqEAo++iHTy/wyKlW+v43KKP6Pq7jZ1aeAn8gSN4JS6LtuCZ/O:TiRHnJ0AoCCKX19g3VJgSuJS6RuoO

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Makes use of the framework's Accessibility service.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Removes its main activity from the application launcher

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks