General
-
Target
d0f6fb23c8d44e145fd53b49aadae882210988562bc50dd4050eb2f299867fa2
-
Size
2.8MB
-
Sample
231204-3x1pzagc3y
-
MD5
d54f97bdf040848bb4c81bc31d1c555c
-
SHA1
f65d0f596ea70b36d5b60dcdd5ebe0ba79c749ce
-
SHA256
d0f6fb23c8d44e145fd53b49aadae882210988562bc50dd4050eb2f299867fa2
-
SHA512
a82e77de72e5bad481dd353f6a1c4646254ce1fcbbe00db7d3f6a48b7fede69be494a1d79445909a9ed48abd66bab49580c10e52efb12b0bb8b4c9f10e526d7b
-
SSDEEP
49152:PCaTT4jHJEeu4+jXhJRt4OQpznwVAkGNA5VsZcYchULdzF/Xx3g/Fz:/T4dcZNJRt4npTwKkGNyJ2LdzFXCz
Behavioral task
behavioral1
Sample
d0f6fb23c8d44e145fd53b49aadae882210988562bc50dd4050eb2f299867fa2.apk
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral2
Sample
d0f6fb23c8d44e145fd53b49aadae882210988562bc50dd4050eb2f299867fa2.apk
Resource
android-x64-20231023.1-en
Behavioral task
behavioral3
Sample
d0f6fb23c8d44e145fd53b49aadae882210988562bc50dd4050eb2f299867fa2.apk
Resource
android-x64-arm64-20231023-en
Malware Config
Extracted
hook
http://195.35.11.135:3434
Targets
-
-
Target
d0f6fb23c8d44e145fd53b49aadae882210988562bc50dd4050eb2f299867fa2
-
Size
2.8MB
-
MD5
d54f97bdf040848bb4c81bc31d1c555c
-
SHA1
f65d0f596ea70b36d5b60dcdd5ebe0ba79c749ce
-
SHA256
d0f6fb23c8d44e145fd53b49aadae882210988562bc50dd4050eb2f299867fa2
-
SHA512
a82e77de72e5bad481dd353f6a1c4646254ce1fcbbe00db7d3f6a48b7fede69be494a1d79445909a9ed48abd66bab49580c10e52efb12b0bb8b4c9f10e526d7b
-
SSDEEP
49152:PCaTT4jHJEeu4+jXhJRt4OQpznwVAkGNA5VsZcYchULdzF/Xx3g/Fz:/T4dcZNJRt4npTwKkGNyJ2LdzFXCz
Score10/10-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service.
-
Acquires the wake lock.
-
Requests enabling of the accessibility settings.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-