General
-
Target
8c321ba5108cd655420d2f9f1131629410beaffded8aa7c104357c07d8d6c57a.bin
-
Size
1.0MB
-
Sample
240225-1xcl2aeb9y
-
MD5
aeae1f67dff8477ff0c4776af92140f2
-
SHA1
9a505433dd72a80abcc2c6f600c08280b170e656
-
SHA256
8c321ba5108cd655420d2f9f1131629410beaffded8aa7c104357c07d8d6c57a
-
SHA512
3701c809496c17954dfef2705c563d5ff5d7b1648ba870928099746664a8c8a4576640d58215902ff3a84cd8ac7487a757840ff5b8c4210ce48100d519d8d90c
-
SSDEEP
24576:kS9yYo6onqmlIJ2GmSiGW2NDZrZzl3U2ha0GIzHPu:kCRnm6HvBzZpl3U2h1RPu
Static task
static1
Behavioral task
behavioral1
Sample
8c321ba5108cd655420d2f9f1131629410beaffded8aa7c104357c07d8d6c57a.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
8c321ba5108cd655420d2f9f1131629410beaffded8aa7c104357c07d8d6c57a.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
8c321ba5108cd655420d2f9f1131629410beaffded8aa7c104357c07d8d6c57a.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
ermac
http://172.214.90.35:3434
Targets
-
-
Target
8c321ba5108cd655420d2f9f1131629410beaffded8aa7c104357c07d8d6c57a.bin
-
Size
1.0MB
-
MD5
aeae1f67dff8477ff0c4776af92140f2
-
SHA1
9a505433dd72a80abcc2c6f600c08280b170e656
-
SHA256
8c321ba5108cd655420d2f9f1131629410beaffded8aa7c104357c07d8d6c57a
-
SHA512
3701c809496c17954dfef2705c563d5ff5d7b1648ba870928099746664a8c8a4576640d58215902ff3a84cd8ac7487a757840ff5b8c4210ce48100d519d8d90c
-
SSDEEP
24576:kS9yYo6onqmlIJ2GmSiGW2NDZrZzl3U2ha0GIzHPu:kCRnm6HvBzZpl3U2h1RPu
-
Ermac2 payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-