General
-
Target
987_obf.apk
-
Size
2.3MB
-
Sample
220802-g3m56sdagp
-
MD5
7b07d5510817ba128f6486293e579492
-
SHA1
85e915ccf11001191af3b446350b0a24e5f36f31
-
SHA256
7a57d72506882fc711d3f739c422ca865c9a2fb5246b9d0c459f017909711e40
-
SHA512
06051628a03255bb4fed834204526335f9201ba8175944e0fbffe3a0432353f653c7feb0290bb225db07ac7a011dd90d563783897d5bb8ded8da60d38e67912a
Static task
static1
Behavioral task
behavioral1
Sample
987_obf.apk
Resource
android-x86-arm-20220621-en
Behavioral task
behavioral2
Sample
987_obf.apk
Resource
android-x64-20220621-en
Behavioral task
behavioral3
Sample
987_obf.apk
Resource
android-x64-arm64-20220621-en
Malware Config
Extracted
ermac
Targets
-
-
Target
987_obf.apk
-
Size
2.3MB
-
MD5
7b07d5510817ba128f6486293e579492
-
SHA1
85e915ccf11001191af3b446350b0a24e5f36f31
-
SHA256
7a57d72506882fc711d3f739c422ca865c9a2fb5246b9d0c459f017909711e40
-
SHA512
06051628a03255bb4fed834204526335f9201ba8175944e0fbffe3a0432353f653c7feb0290bb225db07ac7a011dd90d563783897d5bb8ded8da60d38e67912a
Score10/10-
Ermac2 payload
-
Makes use of the framework's Accessibility service.
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-