General
-
Target
df9b5803b3c9ce64214acaec14b1d9b457b62580f73351858cd5e1fab935d2ee.bin
-
Size
1.9MB
-
Sample
240811-16vh7svhng
-
MD5
7ba1d3ebb1ba62b70f057d1d2f573bf1
-
SHA1
577282fd1149cd5fce5d198391734be432dc814c
-
SHA256
df9b5803b3c9ce64214acaec14b1d9b457b62580f73351858cd5e1fab935d2ee
-
SHA512
14c33eef84a71612313d900a4eecdbcba722c883e72f547b625494fe779be9b122017070ca6e2202f98bd907696a151f8b2c178f4658be1bc2fa8f7d2eef6165
-
SSDEEP
49152:q57g8AdxsybdnepqAYq+M+gLRNfcBycGyCOw:CSDbdnQqLq+M+glNfcBy7Ow
Behavioral task
behavioral1
Sample
df9b5803b3c9ce64214acaec14b1d9b457b62580f73351858cd5e1fab935d2ee.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
df9b5803b3c9ce64214acaec14b1d9b457b62580f73351858cd5e1fab935d2ee.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
df9b5803b3c9ce64214acaec14b1d9b457b62580f73351858cd5e1fab935d2ee.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
hook
http://
Targets
-
-
Target
df9b5803b3c9ce64214acaec14b1d9b457b62580f73351858cd5e1fab935d2ee.bin
-
Size
1.9MB
-
MD5
7ba1d3ebb1ba62b70f057d1d2f573bf1
-
SHA1
577282fd1149cd5fce5d198391734be432dc814c
-
SHA256
df9b5803b3c9ce64214acaec14b1d9b457b62580f73351858cd5e1fab935d2ee
-
SHA512
14c33eef84a71612313d900a4eecdbcba722c883e72f547b625494fe779be9b122017070ca6e2202f98bd907696a151f8b2c178f4658be1bc2fa8f7d2eef6165
-
SSDEEP
49152:q57g8AdxsybdnepqAYq+M+gLRNfcBycGyCOw:CSDbdnQqLq+M+glNfcBy7Ow
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1Input Injection
1Discovery
Process Discovery
1System Network Configuration Discovery
2System Network Connections Discovery
1