General

  • Target

    6cf460d7d8e64fb51d15b15d27c91b4d961c1a38a169d3d498412a668edc3fee.bin

  • Size

    1.8MB

  • Sample

    241225-1ypb8azlhm

  • MD5

    8cc582975ad2202c2cab74ffef1f6577

  • SHA1

    e4f776b69f54a19b8a0c041917ace1a670816794

  • SHA256

    6cf460d7d8e64fb51d15b15d27c91b4d961c1a38a169d3d498412a668edc3fee

  • SHA512

    447a43a15080bdb4560663b23623e9bf8f9cd1b02ffb27193eb0cfd07b9fbdaf09778c6ea8cce8640c75bc8074164b59864da4ed0847d7af6c7c4b32dabbb1b7

  • SSDEEP

    49152:qgSRISjGA/UHYSjGA/UESjGA/UjSjGA/UBSjGA/UnJM15iZUj:+ISt/U4St/UESt/UjSt/UBSt/UnJMjiy

Malware Config

Extracted

Family

hook

C2

http://154.216.20.225:3434

AES_key

Targets

    • Target

      6cf460d7d8e64fb51d15b15d27c91b4d961c1a38a169d3d498412a668edc3fee.bin

    • Size

      1.8MB

    • MD5

      8cc582975ad2202c2cab74ffef1f6577

    • SHA1

      e4f776b69f54a19b8a0c041917ace1a670816794

    • SHA256

      6cf460d7d8e64fb51d15b15d27c91b4d961c1a38a169d3d498412a668edc3fee

    • SHA512

      447a43a15080bdb4560663b23623e9bf8f9cd1b02ffb27193eb0cfd07b9fbdaf09778c6ea8cce8640c75bc8074164b59864da4ed0847d7af6c7c4b32dabbb1b7

    • SSDEEP

      49152:qgSRISjGA/UHYSjGA/UESjGA/UjSjGA/UBSjGA/UnJM15iZUj:+ISt/U4St/UESt/UjSt/UBSt/UnJMjiy

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Hook family

    • Removes its main activity from the application launcher

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Mobile v15

Tasks