General

  • Target

    abcf64399e50efab7bcea29c3e4b02780b5d36dc47341b36376b0f81e40aacc0.bin

  • Size

    3.4MB

  • Sample

    240818-1wzeeaxane

  • MD5

    b61cd9c51fab2c40792ee332e13d521f

  • SHA1

    a83559c042008e793ef5f643ae5ef5c1ee96b8dd

  • SHA256

    abcf64399e50efab7bcea29c3e4b02780b5d36dc47341b36376b0f81e40aacc0

  • SHA512

    fbed90fa2222f9ec720da882c9b31282faf4ee725887388700b4c3225dab66244faf9ec507705d0352789820d4696f0e65f766903d3a3abc8171bd3fb4622cd0

  • SSDEEP

    98304:9nPrS2qV8AWDV+TE2tDpXhtlWsz3GAhTWY:9nyNWDi9DpflWsz3GmB

Malware Config

Extracted

Family

hook

C2

https://ws.starlightsymphony.shop

AES_key

Targets

    • Target

      abcf64399e50efab7bcea29c3e4b02780b5d36dc47341b36376b0f81e40aacc0.bin

    • Size

      3.4MB

    • MD5

      b61cd9c51fab2c40792ee332e13d521f

    • SHA1

      a83559c042008e793ef5f643ae5ef5c1ee96b8dd

    • SHA256

      abcf64399e50efab7bcea29c3e4b02780b5d36dc47341b36376b0f81e40aacc0

    • SHA512

      fbed90fa2222f9ec720da882c9b31282faf4ee725887388700b4c3225dab66244faf9ec507705d0352789820d4696f0e65f766903d3a3abc8171bd3fb4622cd0

    • SSDEEP

      98304:9nPrS2qV8AWDV+TE2tDpXhtlWsz3GAhTWY:9nyNWDi9DpflWsz3GmB

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks