General

  • Target

    4f181b3a42657a4c18a898d84108f7500baf243a2ac710adec1c5938cf0adb57.apk

  • Size

    2.2MB

  • Sample

    250209-ct9wcsskc1

  • MD5

    a5fd3c1e089914a69a62086dca829bf0

  • SHA1

    eae7b8cce8d1718c75098aeeecf1aa0ca3f35c38

  • SHA256

    4f181b3a42657a4c18a898d84108f7500baf243a2ac710adec1c5938cf0adb57

  • SHA512

    b0cf7bad8a6709c63d7173779b38f51459111ba2af2e923b859575b7d09902a3db6aee2b555bdff863d9d7f2b212afed88af9efdabbd95834df615d6d4fa94c0

  • SSDEEP

    49152:Ig/weyrxOFxzXpyHnekeJPGRonx31oSGOcgB0K+kGH3JeilU:dFBX0neLJnxPmgsh3kilU

Malware Config

Extracted

Family

hook

rsa_pubkey
AES_key

Targets

    • Target

      4f181b3a42657a4c18a898d84108f7500baf243a2ac710adec1c5938cf0adb57.apk

    • Size

      2.2MB

    • MD5

      a5fd3c1e089914a69a62086dca829bf0

    • SHA1

      eae7b8cce8d1718c75098aeeecf1aa0ca3f35c38

    • SHA256

      4f181b3a42657a4c18a898d84108f7500baf243a2ac710adec1c5938cf0adb57

    • SHA512

      b0cf7bad8a6709c63d7173779b38f51459111ba2af2e923b859575b7d09902a3db6aee2b555bdff863d9d7f2b212afed88af9efdabbd95834df615d6d4fa94c0

    • SSDEEP

      49152:Ig/weyrxOFxzXpyHnekeJPGRonx31oSGOcgB0K+kGH3JeilU:dFBX0neLJnxPmgsh3kilU

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Hook family

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks