General

  • Target

    8a6a92a7e95ee395c094a172eaec42394e4a68e0e7ddab3e3fc2d9ae40705139.bin

  • Size

    1.2MB

  • Sample

    241108-15419a1cmb

  • MD5

    bdcf4529ea9b43f3c46f3e28b0124d8d

  • SHA1

    0c269d343d80d130933d06c13b8afe15e088b438

  • SHA256

    8a6a92a7e95ee395c094a172eaec42394e4a68e0e7ddab3e3fc2d9ae40705139

  • SHA512

    3f6fc975e3c91280f7ea65c696cac7fcf8fc5dbce4681af058c12ba0a0aacb24895edbfc5eb7db72757d11ca1b7d263d418d0df16a70b11b102354443c6994ae

  • SSDEEP

    24576:Tw9pEHW3N1uxsq7BkYlAUyw9O+XV8QdGn9tNEqZrgSVfb:M9pEHWd1LYnlAS9O+XVHdGbNEkgStb

Malware Config

Extracted

Family

hook

C2

http://37.60.251.9:3434

AES_key

Targets

    • Target

      8a6a92a7e95ee395c094a172eaec42394e4a68e0e7ddab3e3fc2d9ae40705139.bin

    • Size

      1.2MB

    • MD5

      bdcf4529ea9b43f3c46f3e28b0124d8d

    • SHA1

      0c269d343d80d130933d06c13b8afe15e088b438

    • SHA256

      8a6a92a7e95ee395c094a172eaec42394e4a68e0e7ddab3e3fc2d9ae40705139

    • SHA512

      3f6fc975e3c91280f7ea65c696cac7fcf8fc5dbce4681af058c12ba0a0aacb24895edbfc5eb7db72757d11ca1b7d263d418d0df16a70b11b102354443c6994ae

    • SSDEEP

      24576:Tw9pEHW3N1uxsq7BkYlAUyw9O+XV8QdGn9tNEqZrgSVfb:M9pEHWd1LYnlAS9O+XVHdGbNEkgStb

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Hook family

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks