General
-
Target
c0b49d35aba26433370836dacc9d3007.bin
-
Size
2.6MB
-
Sample
240620-eksa3axfkg
-
MD5
68391fe42d6f4f61202f40ff7324b57d
-
SHA1
1dee13f166a3fa951a5fcc7ecca7e6dc15b55fe7
-
SHA256
c370c5b65b7cb690a4318c1ed7dca724281d482486b7f6f797c77ee3e27dba1d
-
SHA512
8963d65b7f3586594585965cc5775109fe57e5e265c9e7c38ac13609d28df2980027f166e45da3cf777f84a0a0efbc236376e7657478d7de0cc622ad03fa5d72
-
SSDEEP
49152:VTkRiCPHpTZ16cMalDIUyxFLyQ1eHRbbsAIBps+YcyXFB+tTb6LgbSfjy6ve:VT1+tmhADUaQ1Q59IL89yN9Ofjle
Behavioral task
behavioral1
Sample
ef9c1ee9c06e8f6f92e9388e445d268072a321a4bf77704054dfdfbc68bd8830.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
ef9c1ee9c06e8f6f92e9388e445d268072a321a4bf77704054dfdfbc68bd8830.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
ef9c1ee9c06e8f6f92e9388e445d268072a321a4bf77704054dfdfbc68bd8830.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Extracted
hook
Targets
-
-
Target
ef9c1ee9c06e8f6f92e9388e445d268072a321a4bf77704054dfdfbc68bd8830.apk
-
Size
2.8MB
-
MD5
c0b49d35aba26433370836dacc9d3007
-
SHA1
fb46397f5d1a37055cc5323d89681dc0d1da5b85
-
SHA256
ef9c1ee9c06e8f6f92e9388e445d268072a321a4bf77704054dfdfbc68bd8830
-
SHA512
c14804d81e12cef1d154dee0c4d650508fd47ea67ebf09b063704834bfde6dd553d18ceb6223212e78cf621caa095aa979ace1dc75357ff3c211811c2bdfee50
-
SSDEEP
49152:R7gmZbnXsxJHCXVvEELV0AUgFw9EdFMVDvRXleFSl2Fu0cFUm4LpisVaQ/jazg/Z:FpbXsxNCXBEELrUgFw991VIYyuV6m4oo
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Requests enabling of the accessibility settings.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Process Discovery
1System Network Configuration Discovery
3System Network Connections Discovery
1