General
-
Target
d6365924607d333ff864dab3fbbdcd015af784f8.rl.zip
-
Size
2.6MB
-
Sample
241102-1tbwbswgpg
-
MD5
c10c0ee0c81c0a65522b359f975c3cf4
-
SHA1
dc6b5421205d9ca4d4391a0e91cd8559a4b5fc9d
-
SHA256
d36d4bd064b17b8326248bc6fe0b23f62563c38651ca79120c615c1782bca733
-
SHA512
7ad2b3e18990044a30e4eef1321748b310d9a6d6fd7615c127faa26d2802d8562fcc46f1554fd06b04a57b8715ba05941853b5a2dd837828feebd16f7d29d653
-
SSDEEP
49152:TSluvlQx+kVQMm0BzD5pDDLSzgNVM/LjCXC5TuDCmzTGa+VgUJ8jqdHUlv:mEWIQbSzgNVRyVQz5ugUJ8GSv
Behavioral task
behavioral1
Sample
d6365924607d333ff864dab3fbbdcd015af784f8.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
d6365924607d333ff864dab3fbbdcd015af784f8.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
d6365924607d333ff864dab3fbbdcd015af784f8.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
hook
Targets
-
-
Target
d6365924607d333ff864dab3fbbdcd015af784f8.rl
-
Size
2.8MB
-
MD5
e18c7b2164b4367184a9d10e26f5d07c
-
SHA1
d6365924607d333ff864dab3fbbdcd015af784f8
-
SHA256
14b005352c07490b3689ac4eb187eb68d2b50cd135e57e1bca2f3469b10e2dd5
-
SHA512
aa296cf5d82bd1fcee51c757ccf86f74e520f4e81a4c880244d92dadb0188fb909784fbe205b89d8aa0d41b8dd8a4e24d4793a90590b488391616704ffe3c46f
-
SSDEEP
49152:wg/b8dl3tUGfjqejT3C9RQGk2v5GfmvJZtwLZGoAVSLD8Ib:lgl3tb7rPSoyvQsNwNucgIb
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1