General
-
Target
2d19cbdd421ebf5024a12f4380d870d127a8b9348d7ababcced56c1bb8702956.bin
-
Size
1.5MB
-
Sample
240615-115rzszgqp
-
MD5
b8a90d312d6d9acaa2ebcec019968126
-
SHA1
558dda73e42412b4bcd122557f2d4ccde8a2a0c1
-
SHA256
2d19cbdd421ebf5024a12f4380d870d127a8b9348d7ababcced56c1bb8702956
-
SHA512
3a9192cc3cdf0d7d40b3daac1cb94d5fd47dec401936ea598bb5f36c03443a42ad7ea056ce4dd451ebaec1ba4e6d36c776db9b9d111a86eaa341f3ea9f13b6bd
-
SSDEEP
49152:yNegqYuOhCwDsH1q5eIU/soZwnmNBIUdH:y9u4V7X2sijNzdH
Behavioral task
behavioral1
Sample
2d19cbdd421ebf5024a12f4380d870d127a8b9348d7ababcced56c1bb8702956.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
2d19cbdd421ebf5024a12f4380d870d127a8b9348d7ababcced56c1bb8702956.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
2d19cbdd421ebf5024a12f4380d870d127a8b9348d7ababcced56c1bb8702956.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Extracted
hook
http://URL_CONNECTION
Targets
-
-
Target
2d19cbdd421ebf5024a12f4380d870d127a8b9348d7ababcced56c1bb8702956.bin
-
Size
1.5MB
-
MD5
b8a90d312d6d9acaa2ebcec019968126
-
SHA1
558dda73e42412b4bcd122557f2d4ccde8a2a0c1
-
SHA256
2d19cbdd421ebf5024a12f4380d870d127a8b9348d7ababcced56c1bb8702956
-
SHA512
3a9192cc3cdf0d7d40b3daac1cb94d5fd47dec401936ea598bb5f36c03443a42ad7ea056ce4dd451ebaec1ba4e6d36c776db9b9d111a86eaa341f3ea9f13b6bd
-
SSDEEP
49152:yNegqYuOhCwDsH1q5eIU/soZwnmNBIUdH:y9u4V7X2sijNzdH
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1