General
-
Target
ac4d8c09ecf4f561945721fc4fa2f1520e2983bac31816f2cac7e99640d9aaed.bin
-
Size
1023KB
-
Sample
240226-1xz3bshc59
-
MD5
d2d06e479ace29b2719540ae361f599a
-
SHA1
a37cc1a6d8a04c6221fd5845afe43480103d9b2a
-
SHA256
ac4d8c09ecf4f561945721fc4fa2f1520e2983bac31816f2cac7e99640d9aaed
-
SHA512
c5f919b000dec253d232a1f344d62f245e04ad6ab1f74e7fe77c361f2900d360a7b128831a1f44f3df553b45bb20b599f3804ea523f9293b00995934088c9a75
-
SSDEEP
24576:NvXJ5Zwtmgjd29BRb/ScgdInUI0pXkNSGEvhTe:ZhHgh2PRHUENSnha
Static task
static1
Behavioral task
behavioral1
Sample
ac4d8c09ecf4f561945721fc4fa2f1520e2983bac31816f2cac7e99640d9aaed.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
ac4d8c09ecf4f561945721fc4fa2f1520e2983bac31816f2cac7e99640d9aaed.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
ac4d8c09ecf4f561945721fc4fa2f1520e2983bac31816f2cac7e99640d9aaed.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
ermac
http://20.0.153.70:3434
Targets
-
-
Target
ac4d8c09ecf4f561945721fc4fa2f1520e2983bac31816f2cac7e99640d9aaed.bin
-
Size
1023KB
-
MD5
d2d06e479ace29b2719540ae361f599a
-
SHA1
a37cc1a6d8a04c6221fd5845afe43480103d9b2a
-
SHA256
ac4d8c09ecf4f561945721fc4fa2f1520e2983bac31816f2cac7e99640d9aaed
-
SHA512
c5f919b000dec253d232a1f344d62f245e04ad6ab1f74e7fe77c361f2900d360a7b128831a1f44f3df553b45bb20b599f3804ea523f9293b00995934088c9a75
-
SSDEEP
24576:NvXJ5Zwtmgjd29BRb/ScgdInUI0pXkNSGEvhTe:ZhHgh2PRHUENSnha
-
Ermac2 payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-