General

  • Target

    2266415e545e466f1de63142617489794dfae2c604fc936ee5e9d2757cc9e5de.bin

  • Size

    4.3MB

  • Sample

    240823-1xg7hs1fqr

  • MD5

    d4d4ff17bb486991f5fe8f0cf0805aec

  • SHA1

    03289460178e9ef8355cfd3d07c9fdbdb01acbb6

  • SHA256

    2266415e545e466f1de63142617489794dfae2c604fc936ee5e9d2757cc9e5de

  • SHA512

    5c9e234932c4c98303ebc3378d2d892843ed8aafceadd4588431e1cc5f0bc95e51f088f50e3f329395972f8d63ace9ef51a04c9ef20e17301c9278ca1a050fd5

  • SSDEEP

    98304:rI3NJdcDBs8Cu5dd3D3hLxV+KT2iSzKH7AlJja1HPIb:I7sfdF1LX+Ka8702Ab

Malware Config

Extracted

Family

hook

C2

http://80.64.30.149

DES_key
AES_key

Targets

    • Target

      2266415e545e466f1de63142617489794dfae2c604fc936ee5e9d2757cc9e5de.bin

    • Size

      4.3MB

    • MD5

      d4d4ff17bb486991f5fe8f0cf0805aec

    • SHA1

      03289460178e9ef8355cfd3d07c9fdbdb01acbb6

    • SHA256

      2266415e545e466f1de63142617489794dfae2c604fc936ee5e9d2757cc9e5de

    • SHA512

      5c9e234932c4c98303ebc3378d2d892843ed8aafceadd4588431e1cc5f0bc95e51f088f50e3f329395972f8d63ace9ef51a04c9ef20e17301c9278ca1a050fd5

    • SSDEEP

      98304:rI3NJdcDBs8Cu5dd3D3hLxV+KT2iSzKH7AlJja1HPIb:I7sfdF1LX+Ka8702Ab

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks