General

  • Target

    bf4a811f1b2674ba3ec2b4e3d262d9f42e7a8c04df0da07be94a79df9ea04533.bin

  • Size

    3.5MB

  • Sample

    240828-1zlbysydph

  • MD5

    d185c9e746f000ee4e096706dfeac937

  • SHA1

    645366d1f5e6d78df929f4c4edf9a69427d35e97

  • SHA256

    bf4a811f1b2674ba3ec2b4e3d262d9f42e7a8c04df0da07be94a79df9ea04533

  • SHA512

    e73b72807b42ad1cad9dd098dd776c1c224b375da88e89abb8157f8a44b2effa75c6d41f464b51273f852e2990ef0ab33760b1b2af5d3e17f5bff42d23cd54d2

  • SSDEEP

    98304:UCA+Kawfvf4klN/lp5bWrKr2g4YS/IS71zIVV23Zu:UCsawfnBlNdpki2g45rJ9M

Malware Config

Extracted

Family

hook

C2

https://ws.holenomolena.online

AES_key

Targets

    • Target

      bf4a811f1b2674ba3ec2b4e3d262d9f42e7a8c04df0da07be94a79df9ea04533.bin

    • Size

      3.5MB

    • MD5

      d185c9e746f000ee4e096706dfeac937

    • SHA1

      645366d1f5e6d78df929f4c4edf9a69427d35e97

    • SHA256

      bf4a811f1b2674ba3ec2b4e3d262d9f42e7a8c04df0da07be94a79df9ea04533

    • SHA512

      e73b72807b42ad1cad9dd098dd776c1c224b375da88e89abb8157f8a44b2effa75c6d41f464b51273f852e2990ef0ab33760b1b2af5d3e17f5bff42d23cd54d2

    • SSDEEP

      98304:UCA+Kawfvf4klN/lp5bWrKr2g4YS/IS71zIVV23Zu:UCsawfnBlNdpki2g45rJ9M

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks