General

  • Target

    725c2cb1c28c05dc82dc93927b936d3a835324367576b3cf18af467c5752301b.bin

  • Size

    2.9MB

  • Sample

    250408-18xfkssrv2

  • MD5

    75d6c41d247cbe0e9bfa784e07ff700f

  • SHA1

    2dfaf4266166f177280a2ad2c462c0bae195ba8d

  • SHA256

    725c2cb1c28c05dc82dc93927b936d3a835324367576b3cf18af467c5752301b

  • SHA512

    f261756135693acec2383e4f7b8e36fa2524b2a70c007706a4c6a898f4fb8d8f7858987820ee5e00eacbab642c88ad38a802984f82e1e3ee9cdc2d94aa677939

  • SSDEEP

    49152:IqHzAFvKkY3rT1Ky+5IWfYBoezOVY6ANw6aES6pFU2t7j3MGlo17+hZ0INvBYabV:5Uv3GhR+5eoCOrjWS6N7j8g3T5Yq1API

Malware Config

Extracted

Family

ermac

C2

http://176.123.169.239

AES_key

Extracted

Family

hook

C2

http://176.123.169.239

AES_key

Targets

    • Target

      725c2cb1c28c05dc82dc93927b936d3a835324367576b3cf18af467c5752301b.bin

    • Size

      2.9MB

    • MD5

      75d6c41d247cbe0e9bfa784e07ff700f

    • SHA1

      2dfaf4266166f177280a2ad2c462c0bae195ba8d

    • SHA256

      725c2cb1c28c05dc82dc93927b936d3a835324367576b3cf18af467c5752301b

    • SHA512

      f261756135693acec2383e4f7b8e36fa2524b2a70c007706a4c6a898f4fb8d8f7858987820ee5e00eacbab642c88ad38a802984f82e1e3ee9cdc2d94aa677939

    • SSDEEP

      49152:IqHzAFvKkY3rT1Ky+5IWfYBoezOVY6ANw6aES6pFU2t7j3MGlo17+hZ0INvBYabV:5Uv3GhR+5eoCOrjWS6N7j8g3T5Yq1API

    • Ermac

      An Android banking trojan first seen in July 2021.

    • Ermac family

    • Ermac2 payload

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Hook family

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v16

Tasks