General

  • Target

    c2281b06c7ccdb65b1d0617254959a29905c582bed7537904eed800cd8004751.bin

  • Size

    2.8MB

  • Sample

    240625-1x73yaydkq

  • MD5

    2ed4afde9eb3f21e46d69124ec5d0d04

  • SHA1

    9dbdfb45fcd84468cf62c3e693446963067d0075

  • SHA256

    c2281b06c7ccdb65b1d0617254959a29905c582bed7537904eed800cd8004751

  • SHA512

    311f93135c6805eb40f781dbdaafedf3acd2dc4bc43d26cccb5617b4cd1e7f52451e21a7299c38f30e7c124def4aab180e90177a6156c014321d8746eb86f403

  • SSDEEP

    49152:87ljMIY6abH++DemlcfMgISrvP1I1B6vQOlrQl4gHa/Big/0b:glj/aHi0CrXEkdlrQlxHa/yb

Malware Config

Extracted

Family

hook

AES_key

Targets

    • Target

      c2281b06c7ccdb65b1d0617254959a29905c582bed7537904eed800cd8004751.bin

    • Size

      2.8MB

    • MD5

      2ed4afde9eb3f21e46d69124ec5d0d04

    • SHA1

      9dbdfb45fcd84468cf62c3e693446963067d0075

    • SHA256

      c2281b06c7ccdb65b1d0617254959a29905c582bed7537904eed800cd8004751

    • SHA512

      311f93135c6805eb40f781dbdaafedf3acd2dc4bc43d26cccb5617b4cd1e7f52451e21a7299c38f30e7c124def4aab180e90177a6156c014321d8746eb86f403

    • SSDEEP

      49152:87ljMIY6abH++DemlcfMgISrvP1I1B6vQOlrQl4gHa/Big/0b:glj/aHi0CrXEkdlrQlxHa/yb

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Mobile v15

Tasks