General

  • Target

    6fd741480791e7cdf99881379603ab5a0b3dd840c6298e8e424a37dbcac99602.bin

  • Size

    1.2MB

  • Sample

    240208-1w9kdabe3s

  • MD5

    6f3dba242c2264acee7d8628c8401838

  • SHA1

    27f923ef644b588e0bdfa481e76454adafb9136e

  • SHA256

    6fd741480791e7cdf99881379603ab5a0b3dd840c6298e8e424a37dbcac99602

  • SHA512

    b60f5059a898ef17fc79321702ea1cc73ac746b4354b09e887f12ab0050c071d7561b513cfc56faf97254032f678b32b216a9e50ace01cc9615d7dd72180d31f

  • SSDEEP

    24576:Vc671ECkx1Mp8dr2m6CbqkZ8Kesb6z4ke+sUMCojIZ5g/5yLg:Cikx1g8df2kZ8oWEdAJZ5g/4g

Malware Config

Extracted

Family

hook

C2

http://192.168.42.132:3434

AES_key

Targets

    • Target

      6fd741480791e7cdf99881379603ab5a0b3dd840c6298e8e424a37dbcac99602.bin

    • Size

      1.2MB

    • MD5

      6f3dba242c2264acee7d8628c8401838

    • SHA1

      27f923ef644b588e0bdfa481e76454adafb9136e

    • SHA256

      6fd741480791e7cdf99881379603ab5a0b3dd840c6298e8e424a37dbcac99602

    • SHA512

      b60f5059a898ef17fc79321702ea1cc73ac746b4354b09e887f12ab0050c071d7561b513cfc56faf97254032f678b32b216a9e50ace01cc9615d7dd72180d31f

    • SSDEEP

      24576:Vc671ECkx1Mp8dr2m6CbqkZ8Kesb6z4ke+sUMCojIZ5g/5yLg:Cikx1g8df2kZ8oWEdAJZ5g/4g

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Removes its main activity from the application launcher

    • Acquires the wake lock

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks