General

  • Target

    0ef21ffb179d61c9aecb291a8e4c88f023346377b49993465367d2d0aa9beeb5

  • Size

    1.2MB

  • Sample

    240209-kv6t4ahh9x

  • MD5

    4344abaeb4717d271b826a4acd7dd464

  • SHA1

    213390187ecdbc6114ce20af02f1107f50cf5139

  • SHA256

    0ef21ffb179d61c9aecb291a8e4c88f023346377b49993465367d2d0aa9beeb5

  • SHA512

    3f8aaad32aaee2788d243fb1a51032990b7480b35a31e88f41463f4c7cee896c395febc72b57092614304f8eb9e6aab076166f17c827ffe6a093c53fbce90d6a

  • SSDEEP

    24576:/cr/pUPpuzhiXD0zJMc9oP3bz/+SKAFwquTqXmLOMkFhpqHhJgSkv:y2PpohA0VMcG3nKhq1wd4UhJgSW

Malware Config

Extracted

Family

hook

C2

http://93.123.39.235:3434

AES_key

Targets

    • Target

      0ef21ffb179d61c9aecb291a8e4c88f023346377b49993465367d2d0aa9beeb5

    • Size

      1.2MB

    • MD5

      4344abaeb4717d271b826a4acd7dd464

    • SHA1

      213390187ecdbc6114ce20af02f1107f50cf5139

    • SHA256

      0ef21ffb179d61c9aecb291a8e4c88f023346377b49993465367d2d0aa9beeb5

    • SHA512

      3f8aaad32aaee2788d243fb1a51032990b7480b35a31e88f41463f4c7cee896c395febc72b57092614304f8eb9e6aab076166f17c827ffe6a093c53fbce90d6a

    • SSDEEP

      24576:/cr/pUPpuzhiXD0zJMc9oP3bz/+SKAFwquTqXmLOMkFhpqHhJgSkv:y2PpohA0VMcG3nKhq1wd4UhJgSW

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Acquires the wake lock

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks