General
-
Target
912c4c52e1d61021a098d93e4c8fcfd440e368c7ed60cc6feb180a993370412f
-
Size
4.4MB
-
Sample
231220-jrcw6sacek
-
MD5
3711fd47766af210965dfd48329385cd
-
SHA1
a7cce8953ef22f62dc8f0948b90ef038b8c6a777
-
SHA256
912c4c52e1d61021a098d93e4c8fcfd440e368c7ed60cc6feb180a993370412f
-
SHA512
c73bc4830f21d40483ccc545068c5406b01af55ef1fd2535450b1d2f80009505d663b6d1f5750b1b43c942970afb61e5f45afc9d364aa53d95d5c75b612a962a
-
SSDEEP
98304:P9tO+8QPTmJJvqhfSYF4f9yLtvp0DtfJLdvP7lcNuBH3SMWdu:PmECmlSYFOAF6fJxxchMWdu
Static task
static1
Behavioral task
behavioral1
Sample
912c4c52e1d61021a098d93e4c8fcfd440e368c7ed60cc6feb180a993370412f.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
912c4c52e1d61021a098d93e4c8fcfd440e368c7ed60cc6feb180a993370412f.apk
Resource
android-x64-20231215-en
Malware Config
Extracted
ermac
http://194.26.29.28:3434
Targets
-
-
Target
912c4c52e1d61021a098d93e4c8fcfd440e368c7ed60cc6feb180a993370412f
-
Size
4.4MB
-
MD5
3711fd47766af210965dfd48329385cd
-
SHA1
a7cce8953ef22f62dc8f0948b90ef038b8c6a777
-
SHA256
912c4c52e1d61021a098d93e4c8fcfd440e368c7ed60cc6feb180a993370412f
-
SHA512
c73bc4830f21d40483ccc545068c5406b01af55ef1fd2535450b1d2f80009505d663b6d1f5750b1b43c942970afb61e5f45afc9d364aa53d95d5c75b612a962a
-
SSDEEP
98304:P9tO+8QPTmJJvqhfSYF4f9yLtvp0DtfJLdvP7lcNuBH3SMWdu:PmECmlSYFOAF6fJxxchMWdu
-
Ermac2 payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-