General
-
Target
495a0621b2afc6adefbf17dc6c3cf5e92ba8227ac6939a20439b1b9dde878617.zip
-
Size
3.7MB
-
Sample
230512-fkpqlsbg86
-
MD5
791cfcd67eeafbda2ed887c7b7063ac8
-
SHA1
b1b4d58baf90feec78e61180c49e3332e0a668c9
-
SHA256
9b5905a253141d4f64394de73775541a7bb16714cff8d18684e24ae887c97fc2
-
SHA512
0875974f09be800df80f5674fe0d7c7143f3b7dd5c4c043338d26f25bc9f8b264fffec7f02fa7ed8074f35a9cfc3cacca0df24a845722298f1e0b3c12b1f3c03
-
SSDEEP
98304:P0mEG9Yh6AK4wk/KZjP+32YmGPhJxjGIr/D27z:smVih60PSlPrLGPrrG
Static task
static1
Behavioral task
behavioral1
Sample
495a0621b2afc6adefbf17dc6c3cf5e92ba8227ac6939a20439b1b9dde878617.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
495a0621b2afc6adefbf17dc6c3cf5e92ba8227ac6939a20439b1b9dde878617.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
495a0621b2afc6adefbf17dc6c3cf5e92ba8227ac6939a20439b1b9dde878617.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Extracted
ermac
Targets
-
-
Target
495a0621b2afc6adefbf17dc6c3cf5e92ba8227ac6939a20439b1b9dde878617
-
Size
3.7MB
-
MD5
a88a497b3ae6bb84209cac0906df61a7
-
SHA1
fd80903a98e187bc841a0aabe04528cc1654b8ee
-
SHA256
495a0621b2afc6adefbf17dc6c3cf5e92ba8227ac6939a20439b1b9dde878617
-
SHA512
684e5ea64375791c2195dd1459d868e6ed2d40ab376b5477e0964c43a4eccc57aab66ce08a55eddb51d1edc6503cf12c9c7ab7f27eb815105ec4ec31ecff5d7a
-
SSDEEP
49152:4GXx4KE5XqsZKV0dw8zbn3A9/HKu84zXYenCh4ebzds31j/D0NcxZBD5I:cz5XqsZDnwxnXYenUP/dsOyxrD+
Score10/10-
Ermac payload
-
Makes use of the framework's Accessibility service.
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-