General
-
Target
c681ffcfd808a31fa2061c505824dfd3aa0b488b1a4f356dc74aad35b556c896.zip
-
Size
1.7MB
-
Sample
220830-hxm4naeeh8
-
MD5
ad5c64ecb9d4d0cc55d3d28ce6d74cf5
-
SHA1
f5eec31be9de22ba2189b82b95c38ebf36d832f2
-
SHA256
c681ffcfd808a31fa2061c505824dfd3aa0b488b1a4f356dc74aad35b556c896
-
SHA512
34416a74ec97608e8e9aaa252314757204149cd986d98ac3a4c3c2ef3ba0903f05901f9eeec904aa19a8629032702b23d52f6f8cb75eeb2a6509db3f8fb54280
-
SSDEEP
24576:6qXR/4N9aIyYcWa4fwaIGJgUQQksADiqeRytdkP2yOf0TwsEVU1poT7/MWcQPAwj:XNcaIO4fgGJggAdkP2ynubT7kZ87r
Static task
static1
Behavioral task
behavioral1
Sample
c681ffcfd808a31fa2061c505824dfd3aa0b488b1a4f356dc74aad35b556c896.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
c681ffcfd808a31fa2061c505824dfd3aa0b488b1a4f356dc74aad35b556c896.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
c681ffcfd808a31fa2061c505824dfd3aa0b488b1a4f356dc74aad35b556c896.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Extracted
ermac
http://62.204.41.98:3434
Targets
-
-
Target
c681ffcfd808a31fa2061c505824dfd3aa0b488b1a4f356dc74aad35b556c896.zip
-
Size
1.7MB
-
MD5
ad5c64ecb9d4d0cc55d3d28ce6d74cf5
-
SHA1
f5eec31be9de22ba2189b82b95c38ebf36d832f2
-
SHA256
c681ffcfd808a31fa2061c505824dfd3aa0b488b1a4f356dc74aad35b556c896
-
SHA512
34416a74ec97608e8e9aaa252314757204149cd986d98ac3a4c3c2ef3ba0903f05901f9eeec904aa19a8629032702b23d52f6f8cb75eeb2a6509db3f8fb54280
-
SSDEEP
24576:6qXR/4N9aIyYcWa4fwaIGJgUQQksADiqeRytdkP2yOf0TwsEVU1poT7/MWcQPAwj:XNcaIO4fgGJggAdkP2ynubT7kZ87r
Score10/10-
Ermac2 payload
-
Makes use of the framework's Accessibility service.
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Queries the unique device ID (IMEI, MEID, IMSI).
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-