General
-
Target
8c0f2137ad6e952559d6a1a2aad8f3495e7e609f437cc048957bc9ebe463817c.bin
-
Size
1.1MB
-
Sample
240225-1ytlyaec7x
-
MD5
a8a5f42eb631b721981f6a976e749b84
-
SHA1
ff646ab48ca2363fe440ae24ea1d9070efe328be
-
SHA256
8c0f2137ad6e952559d6a1a2aad8f3495e7e609f437cc048957bc9ebe463817c
-
SHA512
900e4be797a26d1bbc4dcc8b592f93bdb89f96b8152b4a71f599e10dce195094f0859a7f008ae3c63ce3c1ddd51399a0b1ffbd2febe06fbbc506e40f327554be
-
SSDEEP
24576:A6A0LhA8dB/nVIRBBY9CYDuPLXojySrg/Vqsf:A6AyFdB/nVIRB5YDWbXSrg/Df
Behavioral task
behavioral1
Sample
8c0f2137ad6e952559d6a1a2aad8f3495e7e609f437cc048957bc9ebe463817c.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
8c0f2137ad6e952559d6a1a2aad8f3495e7e609f437cc048957bc9ebe463817c.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
8c0f2137ad6e952559d6a1a2aad8f3495e7e609f437cc048957bc9ebe463817c.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
hook
http://77.73.129.77:3434
Targets
-
-
Target
8c0f2137ad6e952559d6a1a2aad8f3495e7e609f437cc048957bc9ebe463817c.bin
-
Size
1.1MB
-
MD5
a8a5f42eb631b721981f6a976e749b84
-
SHA1
ff646ab48ca2363fe440ae24ea1d9070efe328be
-
SHA256
8c0f2137ad6e952559d6a1a2aad8f3495e7e609f437cc048957bc9ebe463817c
-
SHA512
900e4be797a26d1bbc4dcc8b592f93bdb89f96b8152b4a71f599e10dce195094f0859a7f008ae3c63ce3c1ddd51399a0b1ffbd2febe06fbbc506e40f327554be
-
SSDEEP
24576:A6A0LhA8dB/nVIRBBY9CYDuPLXojySrg/Vqsf:A6AyFdB/nVIRB5YDWbXSrg/Df
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Reads information about phone network operator.
-