Resubmissions

16-12-2024 22:35

241216-2h4yeaskfz 10

16-12-2024 22:35

241216-2hw8kasrep 10

13-12-2024 22:05

241213-1zj4ws1nfl 10

General

  • Target

    194aa64a8107412e8f6442f7addbadcb9e544d25b9915ef534cf175cb6e60b3d.bin

  • Size

    2.8MB

  • Sample

    241216-2h4yeaskfz

  • MD5

    0f197622ba7d3ff87cb16dda5ca5b32f

  • SHA1

    df629604e3e7c13dd3777b8fe1f96a5e081a9813

  • SHA256

    194aa64a8107412e8f6442f7addbadcb9e544d25b9915ef534cf175cb6e60b3d

  • SHA512

    8220ceae9714c07637a04409dfe3b9248292b1a10836c67c65115a6f588421ffac18c56bd7abee542f8222b86e88db3e737f9510538a1b3252a3a77846cde84e

  • SSDEEP

    49152:lLFktfNk/2lW+sligkiCC/ScqLZcGJhwbPSHvklq4ggI0EbWWR4fKmSQ496Kg/Vk:9FkcJ+sliglVkLZVTkhggPWRyKbQ49Ok

Malware Config

Extracted

Family

hook

C2

http://39.109.117.207:3434

AES_key

Targets

    • Target

      194aa64a8107412e8f6442f7addbadcb9e544d25b9915ef534cf175cb6e60b3d.bin

    • Size

      2.8MB

    • MD5

      0f197622ba7d3ff87cb16dda5ca5b32f

    • SHA1

      df629604e3e7c13dd3777b8fe1f96a5e081a9813

    • SHA256

      194aa64a8107412e8f6442f7addbadcb9e544d25b9915ef534cf175cb6e60b3d

    • SHA512

      8220ceae9714c07637a04409dfe3b9248292b1a10836c67c65115a6f588421ffac18c56bd7abee542f8222b86e88db3e737f9510538a1b3252a3a77846cde84e

    • SSDEEP

      49152:lLFktfNk/2lW+sligkiCC/ScqLZcGJhwbPSHvklq4ggI0EbWWR4fKmSQ496Kg/Vk:9FkcJ+sliglVkLZVTkhggPWRyKbQ49Ok

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Hook family

    • Removes its main activity from the application launcher

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Mobile v15

Tasks