General
-
Target
110.apk
-
Size
2.1MB
-
Sample
220803-j2d7zsaaap
-
MD5
aaf8cd2c4ac88b48e79736bbe53c114a
-
SHA1
b3482f2c97fea3e03d8221eeb2f116c4a18588c1
-
SHA256
71927786fc16e90fe05e1eb032c3591d878c7cfd197d02113d7d006e2d7b171f
-
SHA512
ba62a4a1900cc0c2d618775ce9892c5df153dde032954e539f73133fbc2ed5303e112ca4b24d9cc804972b434fed1fedf4af55d70db600e19efa173fe16a47c3
Static task
static1
Behavioral task
behavioral1
Sample
110.apk
Resource
android-x86-arm-20220621-en
Behavioral task
behavioral2
Sample
110.apk
Resource
android-x64-20220621-en
Behavioral task
behavioral3
Sample
110.apk
Resource
android-x64-arm64-20220621-en
Malware Config
Extracted
ermac
Targets
-
-
Target
110.apk
-
Size
2.1MB
-
MD5
aaf8cd2c4ac88b48e79736bbe53c114a
-
SHA1
b3482f2c97fea3e03d8221eeb2f116c4a18588c1
-
SHA256
71927786fc16e90fe05e1eb032c3591d878c7cfd197d02113d7d006e2d7b171f
-
SHA512
ba62a4a1900cc0c2d618775ce9892c5df153dde032954e539f73133fbc2ed5303e112ca4b24d9cc804972b434fed1fedf4af55d70db600e19efa173fe16a47c3
Score10/10-
Ermac2 payload
-
Makes use of the framework's Accessibility service.
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Queries the unique device ID (IMEI, MEID, IMSI).
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-