General

  • Target

    app-debug-1.apk

  • Size

    3.5MB

  • Sample

    240319-t44krsgf26

  • MD5

    7f89e50b0a1f40d7de232cd37edb480c

  • SHA1

    f27035f05b0ba6c6071d50446d11aec654f4157d

  • SHA256

    6bdbfdf7ecea8e11bf64900c381b5372358074d42e54b355ac9156ad40d1eaa1

  • SHA512

    fb0ff1911332a94f2e3155d86091de1d328ee458a6b428f4d9bccbd89323999136643b24611dc328850e3e7e45e34e610b3f7419b5b34e0db5f3497e544b9929

  • SSDEEP

    98304:CjazG1JbMihNsDINDqRXxqY8jt/uoYcJSwh:Cjaq7r6UiXFSrKk

Malware Config

Extracted

Family

hook

C2

http://8629.871.12.343

Targets

    • Target

      app-debug-1.apk

    • Size

      3.5MB

    • MD5

      7f89e50b0a1f40d7de232cd37edb480c

    • SHA1

      f27035f05b0ba6c6071d50446d11aec654f4157d

    • SHA256

      6bdbfdf7ecea8e11bf64900c381b5372358074d42e54b355ac9156ad40d1eaa1

    • SHA512

      fb0ff1911332a94f2e3155d86091de1d328ee458a6b428f4d9bccbd89323999136643b24611dc328850e3e7e45e34e610b3f7419b5b34e0db5f3497e544b9929

    • SSDEEP

      98304:CjazG1JbMihNsDINDqRXxqY8jt/uoYcJSwh:Cjaq7r6UiXFSrKk

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Removes its main activity from the application launcher

    • Requests enabling of the accessibility settings.

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks