General

  • Target

    62b51a131747e8e416bedef0fd3c32cef055e33ba8225f6c174951c8b14fbc47.zip

  • Size

    2.8MB

  • Sample

    240519-mkghkaec62

  • MD5

    28c1720427cbbd5358a817b609301c7b

  • SHA1

    d9010acbe6bbefb9dc7ffbdd17b5196e9d020814

  • SHA256

    62b51a131747e8e416bedef0fd3c32cef055e33ba8225f6c174951c8b14fbc47

  • SHA512

    c57ec88f1e78284bca904b1b6ad8da676f5a0162635b1970e64096e3cef938d8c3b2b2b4cc089404f2532d0162b22d175a5081f736c60a0ae3c831cd17482c2b

  • SSDEEP

    49152:ZLYhvMfJpLF2fjvKwux2Qot8J3fXE469WZmEk/Xx3g/44:ShveF27VO2Qot8/6wZmEuXj4

Malware Config

Extracted

Family

hook

C2

http://154.38.104.54:3434

AES_key

Targets

    • Target

      62b51a131747e8e416bedef0fd3c32cef055e33ba8225f6c174951c8b14fbc47.zip

    • Size

      2.8MB

    • MD5

      28c1720427cbbd5358a817b609301c7b

    • SHA1

      d9010acbe6bbefb9dc7ffbdd17b5196e9d020814

    • SHA256

      62b51a131747e8e416bedef0fd3c32cef055e33ba8225f6c174951c8b14fbc47

    • SHA512

      c57ec88f1e78284bca904b1b6ad8da676f5a0162635b1970e64096e3cef938d8c3b2b2b4cc089404f2532d0162b22d175a5081f736c60a0ae3c831cd17482c2b

    • SSDEEP

      49152:ZLYhvMfJpLF2fjvKwux2Qot8J3fXE469WZmEk/Xx3g/44:ShveF27VO2Qot8/6wZmEuXj4

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Prevents application removal

      Application may abuse the framework's APIs to prevent removal.

    • Removes its main activity from the application launcher

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the phone number (MSISDN for GSM devices)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Requests enabling of the accessibility settings.

    • Acquires the wake lock

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Mobile v15

Tasks