General
-
Target
33cdbe122b9770036722663c25cf778b6480973d8acf03c5a926f1b8b4d27e03.bin
-
Size
1.3MB
-
Sample
240227-1wqghacf5z
-
MD5
5086a26a597b08bcced09645ce779827
-
SHA1
48c041273dfad4e45fd39bc998190586c6fbb23b
-
SHA256
33cdbe122b9770036722663c25cf778b6480973d8acf03c5a926f1b8b4d27e03
-
SHA512
9213ef314d1b65f2751e4d78e63d8e3051654c55d10217453fc2123fc31f34f428bca6dd180ad49914a72a35fd27da7e301b735d32179a96867d0191589c02cf
-
SSDEEP
24576:aGTQvsnp/n891veoYJjrxBld7LMcnw6cmbDtz0uhuh1tzBozSkHdjDAg/OzfNNA:MCp/8912zJ/xBld7wcB3t/oDttDWAg/R
Behavioral task
behavioral1
Sample
33cdbe122b9770036722663c25cf778b6480973d8acf03c5a926f1b8b4d27e03.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
33cdbe122b9770036722663c25cf778b6480973d8acf03c5a926f1b8b4d27e03.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
33cdbe122b9770036722663c25cf778b6480973d8acf03c5a926f1b8b4d27e03.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
ermac
http://94.156.8.245:3434
Targets
-
-
Target
33cdbe122b9770036722663c25cf778b6480973d8acf03c5a926f1b8b4d27e03.bin
-
Size
1.3MB
-
MD5
5086a26a597b08bcced09645ce779827
-
SHA1
48c041273dfad4e45fd39bc998190586c6fbb23b
-
SHA256
33cdbe122b9770036722663c25cf778b6480973d8acf03c5a926f1b8b4d27e03
-
SHA512
9213ef314d1b65f2751e4d78e63d8e3051654c55d10217453fc2123fc31f34f428bca6dd180ad49914a72a35fd27da7e301b735d32179a96867d0191589c02cf
-
SSDEEP
24576:aGTQvsnp/n891veoYJjrxBld7LMcnw6cmbDtz0uhuh1tzBozSkHdjDAg/OzfNNA:MCp/8912zJ/xBld7wcB3t/oDttDWAg/R
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-