General
-
Target
ccfe4d5cc24187a1c8c01fe09c916a0294e75379bb0be592a1b391a91860ecc9.bin
-
Size
3.8MB
-
Sample
240301-1wyswaeb58
-
MD5
b2dbcd8bf53629dce63051ef06ae5dc6
-
SHA1
3425d9e51250adcfb61c49d352dbb121856e97fa
-
SHA256
ccfe4d5cc24187a1c8c01fe09c916a0294e75379bb0be592a1b391a91860ecc9
-
SHA512
0f4157cec8e1321b61d071150334c6d070b86c752b8ae1d64bff00c50b58b71ce015088390baddef97f802472f99d7b82825f64d0c9f9db37baf62b24457be1f
-
SSDEEP
98304:0+DJQWDR1dPTwdwdyJ14CcbB6enzHxn+wpp5cL1bOsa+ATUhX:fD7LcdwocCccenr3cL1Ksa+Awt
Behavioral task
behavioral1
Sample
ccfe4d5cc24187a1c8c01fe09c916a0294e75379bb0be592a1b391a91860ecc9.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
ccfe4d5cc24187a1c8c01fe09c916a0294e75379bb0be592a1b391a91860ecc9.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
ccfe4d5cc24187a1c8c01fe09c916a0294e75379bb0be592a1b391a91860ecc9.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
hook
http://91.92.243.141:3434
Targets
-
-
Target
ccfe4d5cc24187a1c8c01fe09c916a0294e75379bb0be592a1b391a91860ecc9.bin
-
Size
3.8MB
-
MD5
b2dbcd8bf53629dce63051ef06ae5dc6
-
SHA1
3425d9e51250adcfb61c49d352dbb121856e97fa
-
SHA256
ccfe4d5cc24187a1c8c01fe09c916a0294e75379bb0be592a1b391a91860ecc9
-
SHA512
0f4157cec8e1321b61d071150334c6d070b86c752b8ae1d64bff00c50b58b71ce015088390baddef97f802472f99d7b82825f64d0c9f9db37baf62b24457be1f
-
SSDEEP
98304:0+DJQWDR1dPTwdwdyJ14CcbB6enzHxn+wpp5cL1bOsa+ATUhX:fD7LcdwocCccenr3cL1Ksa+Awt
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Reads information about phone network operator.
-