General
-
Target
90c856ab47fb23a9437ffa12b39a17ddf8ddedd56fcad5ea99679882519220e7
-
Size
4.0MB
-
Sample
231220-jkqjpadcf5
-
MD5
ec69d2c87b4eb108518e5b00779d3bd4
-
SHA1
05c6d18ac0d5d3fcf5bbc14281ec66343562f58e
-
SHA256
90c856ab47fb23a9437ffa12b39a17ddf8ddedd56fcad5ea99679882519220e7
-
SHA512
14636f49b6135524793529e532e8c731ad2d1bc934819aba961f9c1dfe6366f7d5637624eeb8e1f75e9cc829b1d1050e720025d902ce2861fe57d0d417f0ac49
-
SSDEEP
98304:HZqkXOxAMJsXgDTMKCAUxMSZOEOHu73PBEAQPxLW/4m87in:wmOy/XgDTtS2SZQA0xLWQo
Static task
static1
Behavioral task
behavioral1
Sample
90c856ab47fb23a9437ffa12b39a17ddf8ddedd56fcad5ea99679882519220e7.apk
Behavioral task
behavioral2
Sample
90c856ab47fb23a9437ffa12b39a17ddf8ddedd56fcad5ea99679882519220e7.apk
Resource
android-x64-20231215-en
Malware Config
Extracted
ermac
http://194.26.29.28:3434
Targets
-
-
Target
90c856ab47fb23a9437ffa12b39a17ddf8ddedd56fcad5ea99679882519220e7
-
Size
4.0MB
-
MD5
ec69d2c87b4eb108518e5b00779d3bd4
-
SHA1
05c6d18ac0d5d3fcf5bbc14281ec66343562f58e
-
SHA256
90c856ab47fb23a9437ffa12b39a17ddf8ddedd56fcad5ea99679882519220e7
-
SHA512
14636f49b6135524793529e532e8c731ad2d1bc934819aba961f9c1dfe6366f7d5637624eeb8e1f75e9cc829b1d1050e720025d902ce2861fe57d0d417f0ac49
-
SSDEEP
98304:HZqkXOxAMJsXgDTMKCAUxMSZOEOHu73PBEAQPxLW/4m87in:wmOy/XgDTtS2SZQA0xLWQo
-
Ermac2 payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-