General
-
Target
fd14a6c67eab31cad7c270ea798919eb3147828f6d256d7df3d9623b77be6676.bin
-
Size
1.3MB
-
Sample
230808-13xjdshf3w
-
MD5
210386cdeed7e4405152769a15286b72
-
SHA1
e1f3ec7462f9766ae5621115e5e5bc8a886b8b19
-
SHA256
fd14a6c67eab31cad7c270ea798919eb3147828f6d256d7df3d9623b77be6676
-
SHA512
6dacf6e1efee56c9686bdb707ac11dddd2da4a8e4b53c8917859bf5ae9112f133193f143d0199e3100ac07506c3cba26ec9f92dd8d31e4cc6d18071dbc783a8d
-
SSDEEP
24576:errfbjf+zwTO/ShvVmcV3JWk0PZUW9vVBypw7eTgShWl:krf/qSJFAkfWvO5TgSw
Static task
static1
Behavioral task
behavioral1
Sample
fd14a6c67eab31cad7c270ea798919eb3147828f6d256d7df3d9623b77be6676.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
fd14a6c67eab31cad7c270ea798919eb3147828f6d256d7df3d9623b77be6676.apk
Resource
android-x64-20230621-en
Behavioral task
behavioral3
Sample
fd14a6c67eab31cad7c270ea798919eb3147828f6d256d7df3d9623b77be6676.apk
Resource
android-x64-arm64-20230621-en
Malware Config
Extracted
ermac
Targets
-
-
Target
fd14a6c67eab31cad7c270ea798919eb3147828f6d256d7df3d9623b77be6676.bin
-
Size
1.3MB
-
MD5
210386cdeed7e4405152769a15286b72
-
SHA1
e1f3ec7462f9766ae5621115e5e5bc8a886b8b19
-
SHA256
fd14a6c67eab31cad7c270ea798919eb3147828f6d256d7df3d9623b77be6676
-
SHA512
6dacf6e1efee56c9686bdb707ac11dddd2da4a8e4b53c8917859bf5ae9112f133193f143d0199e3100ac07506c3cba26ec9f92dd8d31e4cc6d18071dbc783a8d
-
SSDEEP
24576:errfbjf+zwTO/ShvVmcV3JWk0PZUW9vVBypw7eTgShWl:krf/qSJFAkfWvO5TgSw
Score10/10-
Ermac2 payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Uses Crypto APIs (Might try to encrypt user data).
-