General

  • Target

    3d1c3e995eb6264087fddaabfe6d8eebab86cc71d8aca1f9f7a74da41feaecf2.bin

  • Size

    4.3MB

  • Sample

    240823-1xa37s1fqj

  • MD5

    b02786d6f5740d65ef1ead13f0ec8938

  • SHA1

    60c60469dec98c4c80ed8b689436059bcf1c2c39

  • SHA256

    3d1c3e995eb6264087fddaabfe6d8eebab86cc71d8aca1f9f7a74da41feaecf2

  • SHA512

    fefeb1bd1880d9261ba381442250617bbc4e4e2b651791d8a562c9ad232351824c4fb4b3588ac78170dd02485a926b153b7f5cb2b5736044ed4b341222d2b551

  • SSDEEP

    98304:QgkCgFq3QjO+HeDISnR+QZMKm8d1LQyVdKFWWvrTSOPe5Zb4jXOxHv:Qgkq+O++chKJTL1VirTSJb4jXOB

Malware Config

Extracted

Family

hook

C2

http://80.64.30.149

DES_key
AES_key

Targets

    • Target

      3d1c3e995eb6264087fddaabfe6d8eebab86cc71d8aca1f9f7a74da41feaecf2.bin

    • Size

      4.3MB

    • MD5

      b02786d6f5740d65ef1ead13f0ec8938

    • SHA1

      60c60469dec98c4c80ed8b689436059bcf1c2c39

    • SHA256

      3d1c3e995eb6264087fddaabfe6d8eebab86cc71d8aca1f9f7a74da41feaecf2

    • SHA512

      fefeb1bd1880d9261ba381442250617bbc4e4e2b651791d8a562c9ad232351824c4fb4b3588ac78170dd02485a926b153b7f5cb2b5736044ed4b341222d2b551

    • SSDEEP

      98304:QgkCgFq3QjO+HeDISnR+QZMKm8d1LQyVdKFWWvrTSOPe5Zb4jXOxHv:Qgkq+O++chKJTL1VirTSJb4jXOB

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks