General
-
Target
2ea7d595e0e7965f4fedf7f3012261e3d47f618f1a7043859b3cd1c006a4a2d8.apk
-
Size
2.9MB
-
Sample
230123-w759wagc31
-
MD5
8f860fe68a5aa80a0f38c8e0e85de95c
-
SHA1
1c4a40dba1fb6a8e63bbc75e53bf807b91805bba
-
SHA256
2ea7d595e0e7965f4fedf7f3012261e3d47f618f1a7043859b3cd1c006a4a2d8
-
SHA512
b4097b4384476844388b37a8666b52600a8904d41c088a089185386e4e7648caeaf9006c4186a11518b86fb9bd5c38145ab2386c5448f805e44d02399b957280
-
SSDEEP
49152:R7MG0EbYQK7uHt4fjdhIxVycny6693XxKRXefHHWbnh:BMkYQK7uFM993XtHHWbh
Static task
static1
Behavioral task
behavioral1
Sample
2ea7d595e0e7965f4fedf7f3012261e3d47f618f1a7043859b3cd1c006a4a2d8.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral2
Sample
2ea7d595e0e7965f4fedf7f3012261e3d47f618f1a7043859b3cd1c006a4a2d8.apk
Resource
android-x64-arm64-20220823-en
Behavioral task
behavioral3
Sample
2ea7d595e0e7965f4fedf7f3012261e3d47f618f1a7043859b3cd1c006a4a2d8.apk
Resource
android-x86-arm-20220823-en
Malware Config
Extracted
ermac
http://176.113.115.66:3434
Targets
-
-
Target
2ea7d595e0e7965f4fedf7f3012261e3d47f618f1a7043859b3cd1c006a4a2d8.apk
-
Size
2.9MB
-
MD5
8f860fe68a5aa80a0f38c8e0e85de95c
-
SHA1
1c4a40dba1fb6a8e63bbc75e53bf807b91805bba
-
SHA256
2ea7d595e0e7965f4fedf7f3012261e3d47f618f1a7043859b3cd1c006a4a2d8
-
SHA512
b4097b4384476844388b37a8666b52600a8904d41c088a089185386e4e7648caeaf9006c4186a11518b86fb9bd5c38145ab2386c5448f805e44d02399b957280
-
SSDEEP
49152:R7MG0EbYQK7uHt4fjdhIxVycny6693XxKRXefHHWbnh:BMkYQK7uFM993XtHHWbh
Score10/10-
Ermac2 payload
-
Makes use of the framework's Accessibility service.
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Queries the unique device ID (IMEI, MEID, IMSI).
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-