General

  • Target

    9fafcb0b15af11c80844a7bb0441f321349a9cb6a7a838c8049b5a325d4573fd.bin

  • Size

    3.0MB

  • Sample

    240125-1yspmshccr

  • MD5

    f657f65a0a02bdac981d68609251f03e

  • SHA1

    978bc99ff6c510e8befad1a889ee8dcc80d4a41b

  • SHA256

    9fafcb0b15af11c80844a7bb0441f321349a9cb6a7a838c8049b5a325d4573fd

  • SHA512

    e0189910eed9eba36428a81738e8247d93f0e13fdae88c10c6529685d86ac49072b8af84febceeb5a0873cec6b6155895d48ddb7609496b95e13a2a9f391df5d

  • SSDEEP

    49152:4Vz4uWQlIeYoiA3NaID7c+0gdIfNR/sCRJW1WrN/j3wiAXtTCg/p/e:4VRRlIe+alDI+0kqNRFJWEZ/z3AXLe

Malware Config

Extracted

Family

hook

C2

http://185.172.128.91:3434

AES_key

Targets

    • Target

      9fafcb0b15af11c80844a7bb0441f321349a9cb6a7a838c8049b5a325d4573fd.bin

    • Size

      3.0MB

    • MD5

      f657f65a0a02bdac981d68609251f03e

    • SHA1

      978bc99ff6c510e8befad1a889ee8dcc80d4a41b

    • SHA256

      9fafcb0b15af11c80844a7bb0441f321349a9cb6a7a838c8049b5a325d4573fd

    • SHA512

      e0189910eed9eba36428a81738e8247d93f0e13fdae88c10c6529685d86ac49072b8af84febceeb5a0873cec6b6155895d48ddb7609496b95e13a2a9f391df5d

    • SSDEEP

      49152:4Vz4uWQlIeYoiA3NaID7c+0gdIfNR/sCRJW1WrN/j3wiAXtTCg/p/e:4VRRlIe+alDI+0kqNRFJWEZ/z3AXLe

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Acquires the wake lock

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks