General

  • Target

    21d7ddfb5df55459b6fd4da0977a52987f5ba0bef8474b9fc72e584048515bf3.bin

  • Size

    1.1MB

  • Sample

    240625-1yg8xawdqb

  • MD5

    520932af2256ef232b75738d1dd7ef8d

  • SHA1

    0891cf2c14c478683eff2122c8d6e543b03605b5

  • SHA256

    21d7ddfb5df55459b6fd4da0977a52987f5ba0bef8474b9fc72e584048515bf3

  • SHA512

    eccd0527c67ddb8ac77115d9f22460f7cfe500e0ddcb085e3948e0aa271d355745377792a398c4bb0a2d371f89d9611b411ac76ed55fe82c9b8013b3ce5b99e0

  • SSDEEP

    24576:/XvUdwU+WNHfj+k5SZnHz5j80/1j506ZZwM9ojyyO6Seg/RnUT:/XcD+WpfyPHzJ8019FZSM9XyODeg/CT

Malware Config

Extracted

Family

hook

AES_key

Targets

    • Target

      21d7ddfb5df55459b6fd4da0977a52987f5ba0bef8474b9fc72e584048515bf3.bin

    • Size

      1.1MB

    • MD5

      520932af2256ef232b75738d1dd7ef8d

    • SHA1

      0891cf2c14c478683eff2122c8d6e543b03605b5

    • SHA256

      21d7ddfb5df55459b6fd4da0977a52987f5ba0bef8474b9fc72e584048515bf3

    • SHA512

      eccd0527c67ddb8ac77115d9f22460f7cfe500e0ddcb085e3948e0aa271d355745377792a398c4bb0a2d371f89d9611b411ac76ed55fe82c9b8013b3ce5b99e0

    • SSDEEP

      24576:/XvUdwU+WNHfj+k5SZnHz5j80/1j506ZZwM9ojyyO6Seg/RnUT:/XcD+WpfyPHzJ8019FZSM9XyODeg/CT

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Mobile v15

Tasks