General
-
Target
b6cd946497995ffff706afca76d3139d9f992f42e2524f8b78a863c8681b8854.bin
-
Size
1.9MB
-
Sample
240220-1wzeeaga65
-
MD5
676070d6bb6a46802e00d662fe0666cb
-
SHA1
a7a111b8dfee9774f5fd5656c02cc0962a4b454d
-
SHA256
b6cd946497995ffff706afca76d3139d9f992f42e2524f8b78a863c8681b8854
-
SHA512
a1f991a900d5ada4fc7ca2a891266d60c39e14f065afb17c8753aef6276cdee71d0f713ce64d8e4d2045443a209ed1d09ef2e7522b28d86a9a18a87d056391ca
-
SSDEEP
49152:jEmKrjPT0dWF05dLMVTFdr4pstRMhE5HJ5SRX:iPP4dWWbMVTFdr4ePh5yX
Static task
static1
Behavioral task
behavioral1
Sample
b6cd946497995ffff706afca76d3139d9f992f42e2524f8b78a863c8681b8854.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
b6cd946497995ffff706afca76d3139d9f992f42e2524f8b78a863c8681b8854.apk
Resource
android-x64-20231215-en
Malware Config
Extracted
hook
http://94.177.106.48:3434
Targets
-
-
Target
b6cd946497995ffff706afca76d3139d9f992f42e2524f8b78a863c8681b8854.bin
-
Size
1.9MB
-
MD5
676070d6bb6a46802e00d662fe0666cb
-
SHA1
a7a111b8dfee9774f5fd5656c02cc0962a4b454d
-
SHA256
b6cd946497995ffff706afca76d3139d9f992f42e2524f8b78a863c8681b8854
-
SHA512
a1f991a900d5ada4fc7ca2a891266d60c39e14f065afb17c8753aef6276cdee71d0f713ce64d8e4d2045443a209ed1d09ef2e7522b28d86a9a18a87d056391ca
-
SSDEEP
49152:jEmKrjPT0dWF05dLMVTFdr4pstRMhE5HJ5SRX:iPP4dWWbMVTFdr4ePh5yX
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-
Acquires the wake lock
-
Reads information about phone network operator.
-