General
-
Target
c3091c704358f7b326543e9304499e2e5f1e27fcc43d84750c48fda232e37ee6.bin
-
Size
3.5MB
-
Sample
240401-1x6vwagh96
-
MD5
447868eb6480e83644df360ac8cb42ce
-
SHA1
500c2b6e50511afcfe385a68bc279d2549894abf
-
SHA256
c3091c704358f7b326543e9304499e2e5f1e27fcc43d84750c48fda232e37ee6
-
SHA512
f439c758ef63151d5b012479268dca13c63229dd6e2a064ad46da227aeb4621f0021e3135c02aec4c8ecb1580a955da2d47bb1cc614aa7ca0466027ed8d3a518
-
SSDEEP
98304:1B5GqqzNIClptDm9P6boJtD15qZ3O+BsaojFuf:HMLH3tqP6boJtjjqyI
Behavioral task
behavioral1
Sample
c3091c704358f7b326543e9304499e2e5f1e27fcc43d84750c48fda232e37ee6.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
c3091c704358f7b326543e9304499e2e5f1e27fcc43d84750c48fda232e37ee6.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
c3091c704358f7b326543e9304499e2e5f1e27fcc43d84750c48fda232e37ee6.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
hook
http://137.184.228.202:3434
Targets
-
-
Target
c3091c704358f7b326543e9304499e2e5f1e27fcc43d84750c48fda232e37ee6.bin
-
Size
3.5MB
-
MD5
447868eb6480e83644df360ac8cb42ce
-
SHA1
500c2b6e50511afcfe385a68bc279d2549894abf
-
SHA256
c3091c704358f7b326543e9304499e2e5f1e27fcc43d84750c48fda232e37ee6
-
SHA512
f439c758ef63151d5b012479268dca13c63229dd6e2a064ad46da227aeb4621f0021e3135c02aec4c8ecb1580a955da2d47bb1cc614aa7ca0466027ed8d3a518
-
SSDEEP
98304:1B5GqqzNIClptDm9P6boJtD15qZ3O+BsaojFuf:HMLH3tqP6boJtjjqyI
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Acquires the wake lock
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-