General
-
Target
73846f8392dd5ea1297fe5f4daab4810.apk
-
Size
3.8MB
-
Sample
230212-r41g1aef72
-
MD5
73846f8392dd5ea1297fe5f4daab4810
-
SHA1
6c7760cd5d3c3b8b23bec06d28e7288d3464a904
-
SHA256
815e50d8fcdee04f06ecc69dceb7306e8f254c36e7c5781ee0fe3ff971707bc9
-
SHA512
a6c77422bd5a3f18a4d8d26e0626921453ae1a2518b12380fdf8b0a11a5e308a9aea40bfe921f0530b5ac32b36b3e03da607090b45a35019bce6d494a999458e
-
SSDEEP
98304:MCvQvtMntkC/Cnzbj90BOaTaXiQmAn66R:rQvtKtHozbRSO4aSQt66R
Static task
static1
Behavioral task
behavioral1
Sample
73846f8392dd5ea1297fe5f4daab4810.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
73846f8392dd5ea1297fe5f4daab4810.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
73846f8392dd5ea1297fe5f4daab4810.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Extracted
hook
http://193.233.196.2:3434
Targets
-
-
Target
73846f8392dd5ea1297fe5f4daab4810.apk
-
Size
3.8MB
-
MD5
73846f8392dd5ea1297fe5f4daab4810
-
SHA1
6c7760cd5d3c3b8b23bec06d28e7288d3464a904
-
SHA256
815e50d8fcdee04f06ecc69dceb7306e8f254c36e7c5781ee0fe3ff971707bc9
-
SHA512
a6c77422bd5a3f18a4d8d26e0626921453ae1a2518b12380fdf8b0a11a5e308a9aea40bfe921f0530b5ac32b36b3e03da607090b45a35019bce6d494a999458e
-
SSDEEP
98304:MCvQvtMntkC/Cnzbj90BOaTaXiQmAn66R:rQvtKtHozbRSO4aSQt66R
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-