General

  • Target

    02ce1c31f12891f279532399a9fce9dbf2a3682c75ff96449f8eae2a41cc00fb.bin

  • Size

    4.2MB

  • Sample

    240810-1w2jrsvaje

  • MD5

    69366ff7330a14f1a19db9dda0bf3bed

  • SHA1

    be6b6a9a9ef9f401b7262d32b8f9183e11d21230

  • SHA256

    02ce1c31f12891f279532399a9fce9dbf2a3682c75ff96449f8eae2a41cc00fb

  • SHA512

    910b7f0d2a90af0e37afab9b4f0aaf2c4d426e2bbc7fdd2406dcacdccf2d4412ac604a57cf34838f51e584c2caf6b74b2ab56468ff124b7e81aa5bb6ed01b769

  • SSDEEP

    98304:GdWBezq15FGYg+DFj+HoKYskK2A/wKG3eFW4:G+ezq15FGfaFj+HoKYskzCwt3eP

Malware Config

Extracted

Family

hook

C2

http://193.3.19.40

DES_key
AES_key

Targets

    • Target

      02ce1c31f12891f279532399a9fce9dbf2a3682c75ff96449f8eae2a41cc00fb.bin

    • Size

      4.2MB

    • MD5

      69366ff7330a14f1a19db9dda0bf3bed

    • SHA1

      be6b6a9a9ef9f401b7262d32b8f9183e11d21230

    • SHA256

      02ce1c31f12891f279532399a9fce9dbf2a3682c75ff96449f8eae2a41cc00fb

    • SHA512

      910b7f0d2a90af0e37afab9b4f0aaf2c4d426e2bbc7fdd2406dcacdccf2d4412ac604a57cf34838f51e584c2caf6b74b2ab56468ff124b7e81aa5bb6ed01b769

    • SSDEEP

      98304:GdWBezq15FGYg+DFj+HoKYskK2A/wKG3eFW4:G+ezq15FGfaFj+HoKYskzCwt3eP

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks