General

  • Target

    7a2bd6350fd31bcc7a255364e20a8583c7f3312fbf8f817f00e29d3e3be1a199.bin

  • Size

    1.1MB

  • Sample

    240625-1ywfjawejf

  • MD5

    61996b4c60cf3bcb71b142912e31bf9e

  • SHA1

    4d6416fc70563c4f5685bbb219a35cf99b40d904

  • SHA256

    7a2bd6350fd31bcc7a255364e20a8583c7f3312fbf8f817f00e29d3e3be1a199

  • SHA512

    a1cd57cc0060635f93665e0a2006ec4c691e32a8859de678658ef8978631a077dce2cbfbfb2e4002f1438b1daea977ea0724fb5a570fcbb4569d7965665fdd33

  • SSDEEP

    24576:bY3KfQjJkykdgHzKrJU36czjUZSojyjz+sdg/T6XG:bPQlktgHzekFjQSXH+sdg/WG

Malware Config

Extracted

Family

hook

C2

http://194.59.31.228:3434

AES_key

Targets

    • Target

      7a2bd6350fd31bcc7a255364e20a8583c7f3312fbf8f817f00e29d3e3be1a199.bin

    • Size

      1.1MB

    • MD5

      61996b4c60cf3bcb71b142912e31bf9e

    • SHA1

      4d6416fc70563c4f5685bbb219a35cf99b40d904

    • SHA256

      7a2bd6350fd31bcc7a255364e20a8583c7f3312fbf8f817f00e29d3e3be1a199

    • SHA512

      a1cd57cc0060635f93665e0a2006ec4c691e32a8859de678658ef8978631a077dce2cbfbfb2e4002f1438b1daea977ea0724fb5a570fcbb4569d7965665fdd33

    • SSDEEP

      24576:bY3KfQjJkykdgHzKrJU36czjUZSojyjz+sdg/T6XG:bPQlktgHzekFjQSXH+sdg/WG

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Mobile v15

Tasks