General

  • Target

    e27626fbd3fed7766a4ffa5d6ba6576b1ab9dbb1eb399bf8d5fbe5a45378fdbf.bin

  • Size

    1.1MB

  • Sample

    250417-11tdystvet

  • MD5

    863c2331cc552279fb993ec06c4b7b90

  • SHA1

    c87ac7f7a01783042ff155dab9c8118c2bd6aa55

  • SHA256

    e27626fbd3fed7766a4ffa5d6ba6576b1ab9dbb1eb399bf8d5fbe5a45378fdbf

  • SHA512

    008cfb98b466861bc6727c4aa8e4b2bb71a815c72b3015e9a0baf3244eeb92cc87dd8500e2b4de3b1550b81c415bd1a8e8f7e9c2354466fb45c7028446fe3a7d

  • SSDEEP

    24576:uPjsP8lhWDf5h6dXVN5zye66MCeUVxX0siPIojyb6Xg/VsEk:uP8Muf/66V6MCxxX00Xb6Xg/Zk

Malware Config

Extracted

Family

hook

C2

http://94.131.121.103

AES_key

Targets

    • Target

      e27626fbd3fed7766a4ffa5d6ba6576b1ab9dbb1eb399bf8d5fbe5a45378fdbf.bin

    • Size

      1.1MB

    • MD5

      863c2331cc552279fb993ec06c4b7b90

    • SHA1

      c87ac7f7a01783042ff155dab9c8118c2bd6aa55

    • SHA256

      e27626fbd3fed7766a4ffa5d6ba6576b1ab9dbb1eb399bf8d5fbe5a45378fdbf

    • SHA512

      008cfb98b466861bc6727c4aa8e4b2bb71a815c72b3015e9a0baf3244eeb92cc87dd8500e2b4de3b1550b81c415bd1a8e8f7e9c2354466fb45c7028446fe3a7d

    • SSDEEP

      24576:uPjsP8lhWDf5h6dXVN5zye66MCeUVxX0siPIojyb6Xg/VsEk:uP8Muf/66V6MCxxX00Xb6Xg/Zk

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Hook family

    • Removes its main activity from the application launcher

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v16

Tasks