General
-
Target
0e4a594eff2959083c749e4ac259740e9910085bbf1fe985cebfd46e1fa50446.bin
-
Size
1.1MB
-
Sample
241125-1yxctsvrek
-
MD5
011273d9445d0f8bd4147bb4a4ffbb60
-
SHA1
4e3b907d12936dc380247c4ef1b3e67cc3cb5a08
-
SHA256
0e4a594eff2959083c749e4ac259740e9910085bbf1fe985cebfd46e1fa50446
-
SHA512
1b2491bc8dde0247e0e61292b36c18143a917ddf02a4e57c55816e17a557d0ea7a0fd4e85f423522f8209f5d0772a641ffce3b3fbc019a765e4afee70dee3131
-
SSDEEP
24576:gaJoccDxQwEBswcPwu8lSkuXYwZI+D4o1qojywog/B5wfi:gGocEyfSwPWm+iXwog/Ufi
Behavioral task
behavioral1
Sample
0e4a594eff2959083c749e4ac259740e9910085bbf1fe985cebfd46e1fa50446.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
0e4a594eff2959083c749e4ac259740e9910085bbf1fe985cebfd46e1fa50446.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
0e4a594eff2959083c749e4ac259740e9910085bbf1fe985cebfd46e1fa50446.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
hook
http://87.120.117.193:3434
Targets
-
-
Target
0e4a594eff2959083c749e4ac259740e9910085bbf1fe985cebfd46e1fa50446.bin
-
Size
1.1MB
-
MD5
011273d9445d0f8bd4147bb4a4ffbb60
-
SHA1
4e3b907d12936dc380247c4ef1b3e67cc3cb5a08
-
SHA256
0e4a594eff2959083c749e4ac259740e9910085bbf1fe985cebfd46e1fa50446
-
SHA512
1b2491bc8dde0247e0e61292b36c18143a917ddf02a4e57c55816e17a557d0ea7a0fd4e85f423522f8209f5d0772a641ffce3b3fbc019a765e4afee70dee3131
-
SSDEEP
24576:gaJoccDxQwEBswcPwu8lSkuXYwZI+D4o1qojywog/B5wfi:gGocEyfSwPWm+iXwog/Ufi
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
Requests enabling of the accessibility settings.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Process Discovery
1System Network Configuration Discovery
3System Network Connections Discovery
1