General
-
Target
ec2cef70ea8ccb4e4c2de3014df002627ea77a1df4aa8ef53d15e0f4832726cd.bin
-
Size
1.1MB
-
Sample
240120-1w9v5shchp
-
MD5
6caf066fc1d95379a840f5782f096af5
-
SHA1
351a3ac83a0e5e7100514c2a4bc389ba7ef84242
-
SHA256
ec2cef70ea8ccb4e4c2de3014df002627ea77a1df4aa8ef53d15e0f4832726cd
-
SHA512
3f5715959417bd44115f8888ba947c27c9279639b4af3340387c4125308b24cfdb64ca60d5cace72ba054983427ea298b73f1ee5890a7666350fc4ed77a89fcb
-
SSDEEP
24576:kNpP/joDjIbgXULqg1SX5mLLKq3MaPw1FwjojyEFSg/AqxO:kzHj0hyA5mfh3nY/wjXWSg/xO
Behavioral task
behavioral1
Sample
ec2cef70ea8ccb4e4c2de3014df002627ea77a1df4aa8ef53d15e0f4832726cd.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
ec2cef70ea8ccb4e4c2de3014df002627ea77a1df4aa8ef53d15e0f4832726cd.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
ec2cef70ea8ccb4e4c2de3014df002627ea77a1df4aa8ef53d15e0f4832726cd.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Extracted
hook
http://93.123.39.77:3434
Targets
-
-
Target
ec2cef70ea8ccb4e4c2de3014df002627ea77a1df4aa8ef53d15e0f4832726cd.bin
-
Size
1.1MB
-
MD5
6caf066fc1d95379a840f5782f096af5
-
SHA1
351a3ac83a0e5e7100514c2a4bc389ba7ef84242
-
SHA256
ec2cef70ea8ccb4e4c2de3014df002627ea77a1df4aa8ef53d15e0f4832726cd
-
SHA512
3f5715959417bd44115f8888ba947c27c9279639b4af3340387c4125308b24cfdb64ca60d5cace72ba054983427ea298b73f1ee5890a7666350fc4ed77a89fcb
-
SSDEEP
24576:kNpP/joDjIbgXULqg1SX5mLLKq3MaPw1FwjojyEFSg/AqxO:kzHj0hyA5mfh3nY/wjXWSg/xO
Score10/10-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-
Acquires the wake lock
-
Reads information about phone network operator.
-