General
-
Target
0ef21ffb179d61c9aecb291a8e4c88f023346377b49993465367d2d0aa9beeb5
-
Size
1.2MB
-
Sample
240209-kv6t4ahh9x
-
MD5
4344abaeb4717d271b826a4acd7dd464
-
SHA1
213390187ecdbc6114ce20af02f1107f50cf5139
-
SHA256
0ef21ffb179d61c9aecb291a8e4c88f023346377b49993465367d2d0aa9beeb5
-
SHA512
3f8aaad32aaee2788d243fb1a51032990b7480b35a31e88f41463f4c7cee896c395febc72b57092614304f8eb9e6aab076166f17c827ffe6a093c53fbce90d6a
-
SSDEEP
24576:/cr/pUPpuzhiXD0zJMc9oP3bz/+SKAFwquTqXmLOMkFhpqHhJgSkv:y2PpohA0VMcG3nKhq1wd4UhJgSW
Behavioral task
behavioral1
Sample
0ef21ffb179d61c9aecb291a8e4c88f023346377b49993465367d2d0aa9beeb5.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
0ef21ffb179d61c9aecb291a8e4c88f023346377b49993465367d2d0aa9beeb5.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
0ef21ffb179d61c9aecb291a8e4c88f023346377b49993465367d2d0aa9beeb5.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Extracted
hook
http://93.123.39.235:3434
Targets
-
-
Target
0ef21ffb179d61c9aecb291a8e4c88f023346377b49993465367d2d0aa9beeb5
-
Size
1.2MB
-
MD5
4344abaeb4717d271b826a4acd7dd464
-
SHA1
213390187ecdbc6114ce20af02f1107f50cf5139
-
SHA256
0ef21ffb179d61c9aecb291a8e4c88f023346377b49993465367d2d0aa9beeb5
-
SHA512
3f8aaad32aaee2788d243fb1a51032990b7480b35a31e88f41463f4c7cee896c395febc72b57092614304f8eb9e6aab076166f17c827ffe6a093c53fbce90d6a
-
SSDEEP
24576:/cr/pUPpuzhiXD0zJMc9oP3bz/+SKAFwquTqXmLOMkFhpqHhJgSkv:y2PpohA0VMcG3nKhq1wd4UhJgSW
Score10/10-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-
Acquires the wake lock
-
Reads information about phone network operator.
-