General

  • Target

    app-release-2.apk

  • Size

    1.1MB

  • Sample

    241128-y24vzavkgk

  • MD5

    6e7a6796cb2e1c08e7a966a9086aa347

  • SHA1

    4bc7f42e5726d93055ed7f13050d2c64caf7d38a

  • SHA256

    a6f91bcc1c313b706c06161e17947aeb0ad41a85b030775807e6991f1da7eca9

  • SHA512

    fd4e58c40665ab7f9dc52f2c21311345e42483852b53a85fe03e870163294ef96a97e6d756001b5b0649d47dbae7d63b16ef97199998a4411eede36e6196dec2

  • SSDEEP

    24576:ZwHwzbsbF50VN+Oa4YxexUy4fVmLzL8PXSgO//ojAfag/UzGf:yH8bsbF5POaJwxCmLcPXSgM/Ffag/Xf

Malware Config

Extracted

Family

hook

AES_key

Targets

    • Target

      app-release-2.apk

    • Size

      1.1MB

    • MD5

      6e7a6796cb2e1c08e7a966a9086aa347

    • SHA1

      4bc7f42e5726d93055ed7f13050d2c64caf7d38a

    • SHA256

      a6f91bcc1c313b706c06161e17947aeb0ad41a85b030775807e6991f1da7eca9

    • SHA512

      fd4e58c40665ab7f9dc52f2c21311345e42483852b53a85fe03e870163294ef96a97e6d756001b5b0649d47dbae7d63b16ef97199998a4411eede36e6196dec2

    • SSDEEP

      24576:ZwHwzbsbF50VN+Oa4YxexUy4fVmLzL8PXSgO//ojAfag/UzGf:yH8bsbF5POaJwxCmLcPXSgM/Ffag/Xf

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Hook family

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks