General

  • Target

    ec2cef70ea8ccb4e4c2de3014df002627ea77a1df4aa8ef53d15e0f4832726cd.bin

  • Size

    1.1MB

  • Sample

    240120-1w9v5shchp

  • MD5

    6caf066fc1d95379a840f5782f096af5

  • SHA1

    351a3ac83a0e5e7100514c2a4bc389ba7ef84242

  • SHA256

    ec2cef70ea8ccb4e4c2de3014df002627ea77a1df4aa8ef53d15e0f4832726cd

  • SHA512

    3f5715959417bd44115f8888ba947c27c9279639b4af3340387c4125308b24cfdb64ca60d5cace72ba054983427ea298b73f1ee5890a7666350fc4ed77a89fcb

  • SSDEEP

    24576:kNpP/joDjIbgXULqg1SX5mLLKq3MaPw1FwjojyEFSg/AqxO:kzHj0hyA5mfh3nY/wjXWSg/xO

Malware Config

Extracted

Family

hook

C2

http://93.123.39.77:3434

AES_key

Targets

    • Target

      ec2cef70ea8ccb4e4c2de3014df002627ea77a1df4aa8ef53d15e0f4832726cd.bin

    • Size

      1.1MB

    • MD5

      6caf066fc1d95379a840f5782f096af5

    • SHA1

      351a3ac83a0e5e7100514c2a4bc389ba7ef84242

    • SHA256

      ec2cef70ea8ccb4e4c2de3014df002627ea77a1df4aa8ef53d15e0f4832726cd

    • SHA512

      3f5715959417bd44115f8888ba947c27c9279639b4af3340387c4125308b24cfdb64ca60d5cace72ba054983427ea298b73f1ee5890a7666350fc4ed77a89fcb

    • SSDEEP

      24576:kNpP/joDjIbgXULqg1SX5mLLKq3MaPw1FwjojyEFSg/AqxO:kzHj0hyA5mfh3nY/wjXWSg/xO

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Acquires the wake lock

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks