General

  • Target

    bce14fcf7b5c141f3d9f5f31b1aa60db0d951a3728b1ed3d9eae995e2574e87e.bin

  • Size

    1.2MB

  • Sample

    240812-2al3materq

  • MD5

    dc5b59b765c50454c3668bc2608ffe52

  • SHA1

    5945bcc40840cfad63b1b347c8ed87c81ead4e74

  • SHA256

    bce14fcf7b5c141f3d9f5f31b1aa60db0d951a3728b1ed3d9eae995e2574e87e

  • SHA512

    ea2e30b743972f5fb167e8b5d75d28d305871f532362129b5ba58c5f949173821502a186637844aa908c9ada428791d2cdee968a64956c9ff4e9ed4c74665792

  • SSDEEP

    24576:gEs5wSn188ECTBwY16MPIrunOK3KmEFyErgDR4fHklENPl:HK9iCdwY4cp3lEkErgV6CGPl

Malware Config

Extracted

Family

hook

C2

http://wispy-pine-99659.pktriot.net:22284

AES_key

Targets

    • Target

      bce14fcf7b5c141f3d9f5f31b1aa60db0d951a3728b1ed3d9eae995e2574e87e.bin

    • Size

      1.2MB

    • MD5

      dc5b59b765c50454c3668bc2608ffe52

    • SHA1

      5945bcc40840cfad63b1b347c8ed87c81ead4e74

    • SHA256

      bce14fcf7b5c141f3d9f5f31b1aa60db0d951a3728b1ed3d9eae995e2574e87e

    • SHA512

      ea2e30b743972f5fb167e8b5d75d28d305871f532362129b5ba58c5f949173821502a186637844aa908c9ada428791d2cdee968a64956c9ff4e9ed4c74665792

    • SSDEEP

      24576:gEs5wSn188ECTBwY16MPIrunOK3KmEFyErgDR4fHklENPl:HK9iCdwY4cp3lEkErgV6CGPl

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks