General
-
Target
665c3b46a756fc5dd252aad45dd4cde6b4c71a98c43364b45efcaaaecbdaa081.bin
-
Size
850KB
-
Sample
240122-1wnmxadecj
-
MD5
03b004057077cef0b61122f70aaf8ff0
-
SHA1
fded68d0edda4a30c5bb839442bf82f11c7a01b2
-
SHA256
665c3b46a756fc5dd252aad45dd4cde6b4c71a98c43364b45efcaaaecbdaa081
-
SHA512
2490c36864eccaccad7170df93a86dec1a912d02e43b1fefb2749b0bf604546508405cfa44cfd63641d3b67bf8f986df36d39c601104bd97285ce480b4a8ba4d
-
SSDEEP
12288:a6h64f3xC+2iT/9BSp78vjQDCCYeoGrllh/o4CaX4VO/xxkbWQ:+4f4+LD9Qp78vjQoPGz9P1jxxkWQ
Behavioral task
behavioral1
Sample
665c3b46a756fc5dd252aad45dd4cde6b4c71a98c43364b45efcaaaecbdaa081.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
665c3b46a756fc5dd252aad45dd4cde6b4c71a98c43364b45efcaaaecbdaa081.apk
Resource
android-x64-20231215-en
Malware Config
Extracted
ermac
http://89.23.102.60:3434
Targets
-
-
Target
665c3b46a756fc5dd252aad45dd4cde6b4c71a98c43364b45efcaaaecbdaa081.bin
-
Size
850KB
-
MD5
03b004057077cef0b61122f70aaf8ff0
-
SHA1
fded68d0edda4a30c5bb839442bf82f11c7a01b2
-
SHA256
665c3b46a756fc5dd252aad45dd4cde6b4c71a98c43364b45efcaaaecbdaa081
-
SHA512
2490c36864eccaccad7170df93a86dec1a912d02e43b1fefb2749b0bf604546508405cfa44cfd63641d3b67bf8f986df36d39c601104bd97285ce480b4a8ba4d
-
SSDEEP
12288:a6h64f3xC+2iT/9BSp78vjQDCCYeoGrllh/o4CaX4VO/xxkbWQ:+4f4+LD9Qp78vjQoPGz9P1jxxkWQ
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-
Acquires the wake lock
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-