General

  • Target

    d0f6fb23c8d44e145fd53b49aadae882210988562bc50dd4050eb2f299867fa2

  • Size

    2.8MB

  • Sample

    231205-v722sadd3x

  • MD5

    d54f97bdf040848bb4c81bc31d1c555c

  • SHA1

    f65d0f596ea70b36d5b60dcdd5ebe0ba79c749ce

  • SHA256

    d0f6fb23c8d44e145fd53b49aadae882210988562bc50dd4050eb2f299867fa2

  • SHA512

    a82e77de72e5bad481dd353f6a1c4646254ce1fcbbe00db7d3f6a48b7fede69be494a1d79445909a9ed48abd66bab49580c10e52efb12b0bb8b4c9f10e526d7b

  • SSDEEP

    49152:PCaTT4jHJEeu4+jXhJRt4OQpznwVAkGNA5VsZcYchULdzF/Xx3g/Fz:/T4dcZNJRt4npTwKkGNyJ2LdzFXCz

Malware Config

Extracted

Family

hook

C2

http://195.35.11.135:3434

AES_key

Targets

    • Target

      d0f6fb23c8d44e145fd53b49aadae882210988562bc50dd4050eb2f299867fa2

    • Size

      2.8MB

    • MD5

      d54f97bdf040848bb4c81bc31d1c555c

    • SHA1

      f65d0f596ea70b36d5b60dcdd5ebe0ba79c749ce

    • SHA256

      d0f6fb23c8d44e145fd53b49aadae882210988562bc50dd4050eb2f299867fa2

    • SHA512

      a82e77de72e5bad481dd353f6a1c4646254ce1fcbbe00db7d3f6a48b7fede69be494a1d79445909a9ed48abd66bab49580c10e52efb12b0bb8b4c9f10e526d7b

    • SSDEEP

      49152:PCaTT4jHJEeu4+jXhJRt4OQpznwVAkGNA5VsZcYchULdzF/Xx3g/Fz:/T4dcZNJRt4npTwKkGNyJ2LdzFXCz

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Makes use of the framework's Accessibility service.

    • Removes its main activity from the application launcher

    • Acquires the wake lock.

    • Requests enabling of the accessibility settings.

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks