General
-
Target
d6299da308a53c7bb6ac4ab52fd79e1732c67c39b55b7fa5e5c581b1eb15f2f3.zip
-
Size
2.0MB
-
Sample
220830-hxm4naddhj
-
MD5
e16a2e97078de0749a6be9a2504b1025
-
SHA1
b669aa8644884829c1b5b796ac72308697c2655f
-
SHA256
d6299da308a53c7bb6ac4ab52fd79e1732c67c39b55b7fa5e5c581b1eb15f2f3
-
SHA512
acd57cdbe152de795cf47f589cb29671b8a2538acb83d4e076368bba3035353a68acd424b05b39356d0c7bf3042a0ee48f29ca4d0e3d9cafb5d37f6d944a2be5
-
SSDEEP
49152:0Vc4/V5nXH4f6hhL9m1RYZr3ZvKzfUKwQYKJ0:wcYnXRpYYhpvKQSYu0
Static task
static1
Behavioral task
behavioral1
Sample
d6299da308a53c7bb6ac4ab52fd79e1732c67c39b55b7fa5e5c581b1eb15f2f3.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
d6299da308a53c7bb6ac4ab52fd79e1732c67c39b55b7fa5e5c581b1eb15f2f3.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
d6299da308a53c7bb6ac4ab52fd79e1732c67c39b55b7fa5e5c581b1eb15f2f3.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Extracted
ermac
http://62.204.41.98:3434
Targets
-
-
Target
d6299da308a53c7bb6ac4ab52fd79e1732c67c39b55b7fa5e5c581b1eb15f2f3.zip
-
Size
2.0MB
-
MD5
e16a2e97078de0749a6be9a2504b1025
-
SHA1
b669aa8644884829c1b5b796ac72308697c2655f
-
SHA256
d6299da308a53c7bb6ac4ab52fd79e1732c67c39b55b7fa5e5c581b1eb15f2f3
-
SHA512
acd57cdbe152de795cf47f589cb29671b8a2538acb83d4e076368bba3035353a68acd424b05b39356d0c7bf3042a0ee48f29ca4d0e3d9cafb5d37f6d944a2be5
-
SSDEEP
49152:0Vc4/V5nXH4f6hhL9m1RYZr3ZvKzfUKwQYKJ0:wcYnXRpYYhpvKQSYu0
Score10/10-
Ermac2 payload
-
Makes use of the framework's Accessibility service.
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Queries the unique device ID (IMEI, MEID, IMSI).
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-