General
-
Target
d4ae2fca2e9b926ed00e143fe82d5a7a.bin
-
Size
2.6MB
-
Sample
240503-b4qd2abh7s
-
MD5
c9161197d68f5b2fac51c929ca9f005b
-
SHA1
2ab344bc6586c08e4c5d3afd5288398f0e7466cd
-
SHA256
9824d9eb0134dcbc679c1bfc85521036e90a421e4b8416e2af86ce0405e81564
-
SHA512
11056fde9a6b0349be8f6238348e82110a00396452e82602aee7ea7706d63015e437114d01c6ae79ec0202a26f6a13eab603f851ce4c698bf975954aa352bdab
-
SSDEEP
49152:uUnrJOreyRdhaTRxyC+yg3FERFNO2XJqpucGKRCYvklkj9BvbfwsO7:uUnry7CKqO2X6LHC5lSHvI7
Behavioral task
behavioral1
Sample
341c5b8d7fda09706c39fdb959897e9a983f25bb06cfa9b1a96fbfe54854086a.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
341c5b8d7fda09706c39fdb959897e9a983f25bb06cfa9b1a96fbfe54854086a.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
341c5b8d7fda09706c39fdb959897e9a983f25bb06cfa9b1a96fbfe54854086a.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Targets
-
-
Target
341c5b8d7fda09706c39fdb959897e9a983f25bb06cfa9b1a96fbfe54854086a.zip
-
Size
2.8MB
-
MD5
d4ae2fca2e9b926ed00e143fe82d5a7a
-
SHA1
ec1adaff7cce6ad44a1ceea7b8e570b4a30e80cc
-
SHA256
341c5b8d7fda09706c39fdb959897e9a983f25bb06cfa9b1a96fbfe54854086a
-
SHA512
6b64668d1ce3cb2ed7642198300370b9ca91cd4df63add599b5202f798924a1b8d8c380408e7096ba8088ec544ae64be0a5a3ebc4da12cc5fe451a4c52303106
-
SSDEEP
49152:VOzC9Y6YLY4KyrS7sHiV38ZyMf4fgxIIg9nqMUN3OmAtDdZnHIo/kKLg/VQ:VhY6YLYCrMbtaAfgxlg9nqMUZMZ5kbQ
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Queries the phone number (MSISDN for GSM devices)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Requests enabling of the accessibility settings.
-
Acquires the wake lock
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Process Discovery
1System Network Configuration Discovery
3System Network Connections Discovery
1