General
-
Target
27b3e88f94573043132eb16dc810c77b0426b8ef3ff99a30330891bad17f0f08.bin
-
Size
902KB
-
Sample
240125-1xpxcshbhm
-
MD5
422d0e4c21e4e5f28973ee3567f1fba6
-
SHA1
e1a473b5fbd86b0a593a6faa394275913ab0febf
-
SHA256
27b3e88f94573043132eb16dc810c77b0426b8ef3ff99a30330891bad17f0f08
-
SHA512
69b7f1a66a8b4baf1ccb0a6fd078bb31b661ae3a2670aeb38d50527ae7e56217b34bc45c871d7911e19dad93319a85ad64e156864a6bc6c7fabd41e5f3b6453e
-
SSDEEP
12288:KteOSSgApVDjUawS0GzAltnGAOdhwINtGaEQiPr8OWNgXmikdvFQeeWw9xL:KcOrgSJUaVjElhGAlIHEQlOWimmeeWKL
Static task
static1
Behavioral task
behavioral1
Sample
27b3e88f94573043132eb16dc810c77b0426b8ef3ff99a30330891bad17f0f08.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
27b3e88f94573043132eb16dc810c77b0426b8ef3ff99a30330891bad17f0f08.apk
Resource
android-x64-20231215-en
Malware Config
Extracted
ermac
http://45.128.96.21:3434
Targets
-
-
Target
27b3e88f94573043132eb16dc810c77b0426b8ef3ff99a30330891bad17f0f08.bin
-
Size
902KB
-
MD5
422d0e4c21e4e5f28973ee3567f1fba6
-
SHA1
e1a473b5fbd86b0a593a6faa394275913ab0febf
-
SHA256
27b3e88f94573043132eb16dc810c77b0426b8ef3ff99a30330891bad17f0f08
-
SHA512
69b7f1a66a8b4baf1ccb0a6fd078bb31b661ae3a2670aeb38d50527ae7e56217b34bc45c871d7911e19dad93319a85ad64e156864a6bc6c7fabd41e5f3b6453e
-
SSDEEP
12288:KteOSSgApVDjUawS0GzAltnGAOdhwINtGaEQiPr8OWNgXmikdvFQeeWw9xL:KcOrgSJUaVjElhGAlIHEQlOWimmeeWKL
-
Ermac2 payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-