General

  • Target

    af9a6cd0c47ff35f8c1c64bfc1ec90161489d54d5eeb56b15633e2ac31726fee.bin

  • Size

    1.2MB

  • Sample

    241114-1wq32axlhj

  • MD5

    d1a5ba4e82b4739f23cd397634000ada

  • SHA1

    97eae7ef29a4ed24deb5b920f66a3c97a182d4db

  • SHA256

    af9a6cd0c47ff35f8c1c64bfc1ec90161489d54d5eeb56b15633e2ac31726fee

  • SHA512

    b7f4120acd546dcb5d215f24ef864e2dc1c160af37a5c6c802a20ed9c8c926a14621bf8774d10ed1e1e81ace83383d752e8c02314e46aa2f51c2f1e6249ed664

  • SSDEEP

    24576:1/YA9pYzy+US3rxP7azc8Y1vfIasuOUPZ/LTX7g8zc:WANq8zcJ1HIuPZ/Lr7g8w

Malware Config

Extracted

Family

hook

C2

http://154.216.20.42:80

AES_key

Targets

    • Target

      af9a6cd0c47ff35f8c1c64bfc1ec90161489d54d5eeb56b15633e2ac31726fee.bin

    • Size

      1.2MB

    • MD5

      d1a5ba4e82b4739f23cd397634000ada

    • SHA1

      97eae7ef29a4ed24deb5b920f66a3c97a182d4db

    • SHA256

      af9a6cd0c47ff35f8c1c64bfc1ec90161489d54d5eeb56b15633e2ac31726fee

    • SHA512

      b7f4120acd546dcb5d215f24ef864e2dc1c160af37a5c6c802a20ed9c8c926a14621bf8774d10ed1e1e81ace83383d752e8c02314e46aa2f51c2f1e6249ed664

    • SSDEEP

      24576:1/YA9pYzy+US3rxP7azc8Y1vfIasuOUPZ/LTX7g8zc:WANq8zcJ1HIuPZ/Lr7g8w

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Hook family

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks