General
-
Target
739d83c8ca63e674d56bc4c6024eac790d66d460c27437f47009fed834d47feb
-
Size
2.2MB
-
Sample
231220-amds8sbefk
-
MD5
366134f007de0bede5afb773774c4064
-
SHA1
62bec235f1067baf34a0d0b93dfb63e554e65071
-
SHA256
739d83c8ca63e674d56bc4c6024eac790d66d460c27437f47009fed834d47feb
-
SHA512
11b8f919c2a2b92d3e8d48a4f586bf5c13123e976bb4980372f80d57bf43b65e8fdd04e69f4cd1c3a293da58c69cc7d4a0fcc4b4cdb5fa4f521f54a0011caa1a
-
SSDEEP
49152:exu1Da69wU3VYuxhVCrvSU4fqrHvQBTR1oGiMl0:0uDauwUFYWh/UbvQBPoh1
Static task
static1
Behavioral task
behavioral1
Sample
739d83c8ca63e674d56bc4c6024eac790d66d460c27437f47009fed834d47feb.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
739d83c8ca63e674d56bc4c6024eac790d66d460c27437f47009fed834d47feb.apk
Resource
android-x64-20231215-en
Malware Config
Extracted
ermac
http://193.106.191.118:3434
Targets
-
-
Target
739d83c8ca63e674d56bc4c6024eac790d66d460c27437f47009fed834d47feb
-
Size
2.2MB
-
MD5
366134f007de0bede5afb773774c4064
-
SHA1
62bec235f1067baf34a0d0b93dfb63e554e65071
-
SHA256
739d83c8ca63e674d56bc4c6024eac790d66d460c27437f47009fed834d47feb
-
SHA512
11b8f919c2a2b92d3e8d48a4f586bf5c13123e976bb4980372f80d57bf43b65e8fdd04e69f4cd1c3a293da58c69cc7d4a0fcc4b4cdb5fa4f521f54a0011caa1a
-
SSDEEP
49152:exu1Da69wU3VYuxhVCrvSU4fqrHvQBTR1oGiMl0:0uDauwUFYWh/UbvQBPoh1
-
Ermac2 payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-