General

  • Target

    161cb0adb67a217c2d58cba21223a972b5e56bb696f5662bda26dc9275dfab8e.bin

  • Size

    2.9MB

  • Sample

    240413-1wxwksad54

  • MD5

    4cca11d4393f5a4914d4b29bea1d0c1c

  • SHA1

    28abbf2fc20fd2b6ea38928c673a9dccc879edd4

  • SHA256

    161cb0adb67a217c2d58cba21223a972b5e56bb696f5662bda26dc9275dfab8e

  • SHA512

    b22e4051eb65d7fafbc75697b540cb4aa4d12677452beb5008b02f5a4bc57f559bff3f6c03a89026fdfea9600c30b7a6ac697d34dce33e73c783848bd89843aa

  • SSDEEP

    49152:Ir1K35oS/D8IIfASfxavX/o+JqPI87ctEuiAEaPw4D7w5wlwbNK4dm4g/NJ:s1K3l/D8I7SfxityuuaPpD7wmlwZK4du

Malware Config

Extracted

Family

hook

AES_key

Targets

    • Target

      161cb0adb67a217c2d58cba21223a972b5e56bb696f5662bda26dc9275dfab8e.bin

    • Size

      2.9MB

    • MD5

      4cca11d4393f5a4914d4b29bea1d0c1c

    • SHA1

      28abbf2fc20fd2b6ea38928c673a9dccc879edd4

    • SHA256

      161cb0adb67a217c2d58cba21223a972b5e56bb696f5662bda26dc9275dfab8e

    • SHA512

      b22e4051eb65d7fafbc75697b540cb4aa4d12677452beb5008b02f5a4bc57f559bff3f6c03a89026fdfea9600c30b7a6ac697d34dce33e73c783848bd89843aa

    • SSDEEP

      49152:Ir1K35oS/D8IIfASfxavX/o+JqPI87ctEuiAEaPw4D7w5wlwbNK4dm4g/NJ:s1K3l/D8I7SfxityuuaPpD7wmlwZK4du

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about running processes on the device.

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection.

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the phone number (MSISDN for GSM devices)

    • Requests enabling of the accessibility settings.

    • Acquires the wake lock

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks