General
-
Target
f1ba0a022c9efd97840a6dd2853fd907393ea13a4200512f062aa6de7b4e514a.bin
-
Size
2.8MB
-
Sample
240229-1w9kdadg3z
-
MD5
0d938686bf6169169e6aa678f9f95154
-
SHA1
fb690af0a6bd7ce46e08096bcafe366123cf0a3a
-
SHA256
f1ba0a022c9efd97840a6dd2853fd907393ea13a4200512f062aa6de7b4e514a
-
SHA512
d25b4a40be79bd86eb5547e8170efb041eac0e7aa92185ebefccfead83e193e5c8073b2a2ccb4fcf43ad0b3894369a3fd1e380428204440f2b8e321ae3ce8278
-
SSDEEP
49152:g86XQt6FU+E2O3B1My9jLwGMog8rRgaTTyXqyCFHnrN/lGojtDmIAOzt4:g7k6FhE2OTxCgRLTy6FnrJlxZmpOZ4
Static task
static1
Behavioral task
behavioral1
Sample
f1ba0a022c9efd97840a6dd2853fd907393ea13a4200512f062aa6de7b4e514a.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
f1ba0a022c9efd97840a6dd2853fd907393ea13a4200512f062aa6de7b4e514a.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
f1ba0a022c9efd97840a6dd2853fd907393ea13a4200512f062aa6de7b4e514a.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
ermac
http://91.215.85.37:3434
Extracted
hook
http://91.215.85.37:3434
Targets
-
-
Target
f1ba0a022c9efd97840a6dd2853fd907393ea13a4200512f062aa6de7b4e514a.bin
-
Size
2.8MB
-
MD5
0d938686bf6169169e6aa678f9f95154
-
SHA1
fb690af0a6bd7ce46e08096bcafe366123cf0a3a
-
SHA256
f1ba0a022c9efd97840a6dd2853fd907393ea13a4200512f062aa6de7b4e514a
-
SHA512
d25b4a40be79bd86eb5547e8170efb041eac0e7aa92185ebefccfead83e193e5c8073b2a2ccb4fcf43ad0b3894369a3fd1e380428204440f2b8e321ae3ce8278
-
SSDEEP
49152:g86XQt6FU+E2O3B1My9jLwGMog8rRgaTTyXqyCFHnrN/lGojtDmIAOzt4:g7k6FhE2OTxCgRLTy6FnrJlxZmpOZ4
-
Ermac2 payload
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Checks Android system properties for emulator presence.
-
Acquires the wake lock
-
Reads information about phone network operator.
-