Resubmissions

07-11-2024 02:42

241107-c7ay7awldn 10

06-11-2024 22:03

241106-1ynqpa1lhn 10

General

  • Target

    115f5620fdd7aeda3cd7501d65d92b47ca5dc42b559d63728ad22686de2d085c.bin

  • Size

    1.2MB

  • Sample

    241107-c7ay7awldn

  • MD5

    e9e19dd1a26ab153db8d2df9028de604

  • SHA1

    333f47ef8ec04b64bcc9e2a7cbf7cb01ecab30ef

  • SHA256

    115f5620fdd7aeda3cd7501d65d92b47ca5dc42b559d63728ad22686de2d085c

  • SHA512

    6d1459922dd7c18775c47f58f02e06a8804e4bc59bf5d6008331a550ed458551c896a022443ab4735ba5611ffa885c104671432f68697c54b9d59e8dd800d8dd

  • SSDEEP

    24576:uA+D7pWfRtRLRXOrUt1J9b+2M+b6XYIdu6p9sDZugSVbNi:Vg7pOVRXMUnTb+PXFdT9sUgSS

Malware Config

Extracted

Family

hook

C2

http://37.60.251.9:3434

AES_key

Targets

    • Target

      115f5620fdd7aeda3cd7501d65d92b47ca5dc42b559d63728ad22686de2d085c.bin

    • Size

      1.2MB

    • MD5

      e9e19dd1a26ab153db8d2df9028de604

    • SHA1

      333f47ef8ec04b64bcc9e2a7cbf7cb01ecab30ef

    • SHA256

      115f5620fdd7aeda3cd7501d65d92b47ca5dc42b559d63728ad22686de2d085c

    • SHA512

      6d1459922dd7c18775c47f58f02e06a8804e4bc59bf5d6008331a550ed458551c896a022443ab4735ba5611ffa885c104671432f68697c54b9d59e8dd800d8dd

    • SSDEEP

      24576:uA+D7pWfRtRLRXOrUt1J9b+2M+b6XYIdu6p9sDZugSVbNi:Vg7pOVRXMUnTb+PXFdT9sUgSS

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Hook family

    • Removes its main activity from the application launcher

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Mobile v15

Tasks