General
-
Target
signed.apk
-
Size
8.4MB
-
Sample
230204-24dy4sfa46
-
MD5
04f9f15fafe185a87406cfab414f1d82
-
SHA1
e7c818ba772c05c2651577289cc696b193f4883b
-
SHA256
232b31136ca516af6f62abe4dd07fd86edb8be698dca86d4dd27ed284206404a
-
SHA512
ef9f68e9f50b477a4a48b571dcd809b1f92ee75960e2827db69408111e61d599220a5350fa3dc22f200fa784d6ebf6fb1726e22b1bfb966209bf7ac88a0046cf
-
SSDEEP
196608:ZCDDMksCXzgAh+9WoBETw1OYkLJtaJ+KwXLk6I/oJ30jlEaukioEQOYz+:wDQksUogoac1ODDakKwXg6bN0JhlDA
Static task
static1
Behavioral task
behavioral1
Sample
signed.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
signed.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Extracted
ermac
http://185.215.113.81:3000
Extracted
cerberus
http://185.215.113.81:3000
Targets
-
-
Target
signed.apk
-
Size
8.4MB
-
MD5
04f9f15fafe185a87406cfab414f1d82
-
SHA1
e7c818ba772c05c2651577289cc696b193f4883b
-
SHA256
232b31136ca516af6f62abe4dd07fd86edb8be698dca86d4dd27ed284206404a
-
SHA512
ef9f68e9f50b477a4a48b571dcd809b1f92ee75960e2827db69408111e61d599220a5350fa3dc22f200fa784d6ebf6fb1726e22b1bfb966209bf7ac88a0046cf
-
SSDEEP
196608:ZCDDMksCXzgAh+9WoBETw1OYkLJtaJ+KwXLk6I/oJ30jlEaukioEQOYz+:wDQksUogoac1ODDakKwXg6bN0JhlDA
-
Ermac payload
-
Makes use of the framework's Accessibility service.
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-