General

  • Target

    55ab21077d08e84a2c7c79342a44e3d2eb7b5bcb8590cc1763a82ffc90a48b84.bin

  • Size

    4.3MB

  • Sample

    240823-1ws8ds1fmq

  • MD5

    176c87708376aa9a865445324fb46c93

  • SHA1

    c8500268ad8a395cbba91fc3f049a968c2294612

  • SHA256

    55ab21077d08e84a2c7c79342a44e3d2eb7b5bcb8590cc1763a82ffc90a48b84

  • SHA512

    9838527e55427d8021e5e10b22495e994b9879e172366142149bad391ba0b24ebfa532426216c933737e084d908f0ca699665163964b5840ae1b89dee4cbfa3a

  • SSDEEP

    98304:0T7AhiP5Vqlx6nwqLd/ZT6sMKYmFV5msrcp54x7aseqlbw4A+ckT:0nfqH6nwqn6LKYG8sW56a1qqDeT

Malware Config

Extracted

Family

hook

C2

http://80.64.30.149

DES_key
AES_key

Targets

    • Target

      55ab21077d08e84a2c7c79342a44e3d2eb7b5bcb8590cc1763a82ffc90a48b84.bin

    • Size

      4.3MB

    • MD5

      176c87708376aa9a865445324fb46c93

    • SHA1

      c8500268ad8a395cbba91fc3f049a968c2294612

    • SHA256

      55ab21077d08e84a2c7c79342a44e3d2eb7b5bcb8590cc1763a82ffc90a48b84

    • SHA512

      9838527e55427d8021e5e10b22495e994b9879e172366142149bad391ba0b24ebfa532426216c933737e084d908f0ca699665163964b5840ae1b89dee4cbfa3a

    • SSDEEP

      98304:0T7AhiP5Vqlx6nwqLd/ZT6sMKYmFV5msrcp54x7aseqlbw4A+ckT:0nfqH6nwqn6LKYG8sW56a1qqDeT

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks