General
-
Target
0ec3aba023da64c28c3e664ba83a337782c855f3b39874cde59fe8f60b93573a.apk
-
Size
4.6MB
-
Sample
230506-23pdfsha6t
-
MD5
1c74d4eeebdbd04e6f9524f63b15b84d
-
SHA1
5d86aefe2e6632572b971338a5556ee8a9fc96c9
-
SHA256
0ec3aba023da64c28c3e664ba83a337782c855f3b39874cde59fe8f60b93573a
-
SHA512
866761e39296f3399a8b0af6209a644a1a54e0a5519130acf0fafc82e11ec36de83c7d4b7d38f4c4606dcae0a0c745d5f2896e8109d4d5c768ecdd04cd0c4852
-
SSDEEP
98304:k4HuqlDao42RLqaw/jTLq36t+FpyhRTcKm6eAdjTvQlye2tuT/gUMlgm:zHZ2oZ+tm4+fyTTc+JTvy0tK/L+gm
Static task
static1
Behavioral task
behavioral1
Sample
0ec3aba023da64c28c3e664ba83a337782c855f3b39874cde59fe8f60b93573a.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
0ec3aba023da64c28c3e664ba83a337782c855f3b39874cde59fe8f60b93573a.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
0ec3aba023da64c28c3e664ba83a337782c855f3b39874cde59fe8f60b93573a.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Extracted
ermac
http://194.26.29.28:3434
Targets
-
-
Target
0ec3aba023da64c28c3e664ba83a337782c855f3b39874cde59fe8f60b93573a.apk
-
Size
4.6MB
-
MD5
1c74d4eeebdbd04e6f9524f63b15b84d
-
SHA1
5d86aefe2e6632572b971338a5556ee8a9fc96c9
-
SHA256
0ec3aba023da64c28c3e664ba83a337782c855f3b39874cde59fe8f60b93573a
-
SHA512
866761e39296f3399a8b0af6209a644a1a54e0a5519130acf0fafc82e11ec36de83c7d4b7d38f4c4606dcae0a0c745d5f2896e8109d4d5c768ecdd04cd0c4852
-
SSDEEP
98304:k4HuqlDao42RLqaw/jTLq36t+FpyhRTcKm6eAdjTvQlye2tuT/gUMlgm:zHZ2oZ+tm4+fyTTc+JTvy0tK/L+gm
-
Ermac2 payload
-
Makes use of the framework's Accessibility service.
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Queries the unique device ID (IMEI, MEID, IMSI).
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-