General
-
Target
9d1ba69e8482de84f1315b07f00b722c59170fa9b73029cb2b88b79809011f22
-
Size
1.5MB
-
Sample
240216-mggddshb28
-
MD5
a504db0104e555b252a3bf39d93fe93c
-
SHA1
6ca0d1bffa71b45e85d648d574de3fb50c938b65
-
SHA256
9d1ba69e8482de84f1315b07f00b722c59170fa9b73029cb2b88b79809011f22
-
SHA512
dd61f28d1d1031c5774d08902ea77cf3d6df1094d6e061ab3c3a3dbdc1a4e8d422a3a7bddbdd40d6f769d202d1bc23a167ba426a29c3bae16a88b60d8bcba08f
-
SSDEEP
24576:yhq31VixO0eJywY82y8XVwuUYwsq0eqciitOkTHDfWMvkBFjyAMg/lnq:Q6Ae4JJykwIeTiitOGj+MvkCAMg/E
Behavioral task
behavioral1
Sample
9d1ba69e8482de84f1315b07f00b722c59170fa9b73029cb2b88b79809011f22.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
9d1ba69e8482de84f1315b07f00b722c59170fa9b73029cb2b88b79809011f22.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
9d1ba69e8482de84f1315b07f00b722c59170fa9b73029cb2b88b79809011f22.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Extracted
hook
http://hsms1.m0rph3us.com; http://hsms1.mi1kyway.com
http://hsms1.m0rph3us.com
Targets
-
-
Target
9d1ba69e8482de84f1315b07f00b722c59170fa9b73029cb2b88b79809011f22
-
Size
1.5MB
-
MD5
a504db0104e555b252a3bf39d93fe93c
-
SHA1
6ca0d1bffa71b45e85d648d574de3fb50c938b65
-
SHA256
9d1ba69e8482de84f1315b07f00b722c59170fa9b73029cb2b88b79809011f22
-
SHA512
dd61f28d1d1031c5774d08902ea77cf3d6df1094d6e061ab3c3a3dbdc1a4e8d422a3a7bddbdd40d6f769d202d1bc23a167ba426a29c3bae16a88b60d8bcba08f
-
SSDEEP
24576:yhq31VixO0eJywY82y8XVwuUYwsq0eqciitOkTHDfWMvkBFjyAMg/lnq:Q6Ae4JJykwIeTiitOGj+MvkCAMg/E
Score10/10-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Reads information about phone network operator.
-