Resubmissions
02-03-2024 22:03
240302-1ykn2ahh2z 10General
-
Target
6d56dad02e1c2605b05913c4b3362c50988d3837db7823a967b651e1f066b8cc.bin
-
Size
1.1MB
-
Sample
240302-1ykn2ahh2z
-
MD5
1c1aed6897e399e9ad0afa887370dbe9
-
SHA1
52b8ec43ba94b2244ffef3f7a57ba4e7dd9bc376
-
SHA256
6d56dad02e1c2605b05913c4b3362c50988d3837db7823a967b651e1f066b8cc
-
SHA512
7e03e8fd4da627ce54cd68737180828ef8d0a21a811ec00c4d73320b7bc42794ffd0266702f994c6e19d5f3597ea25d5f83b17b1161ca02040a1cf71fc4d98f3
-
SSDEEP
24576:Ti1wlIMotJvnFxgmxChd+FUGCnwiRIr5tjyXUg/ZgJ/Iv:TiiKxgmxM4UFwig5gXUg/1v
Behavioral task
behavioral1
Sample
6d56dad02e1c2605b05913c4b3362c50988d3837db7823a967b651e1f066b8cc.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
6d56dad02e1c2605b05913c4b3362c50988d3837db7823a967b651e1f066b8cc.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
6d56dad02e1c2605b05913c4b3362c50988d3837db7823a967b651e1f066b8cc.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
hook
Targets
-
-
Target
6d56dad02e1c2605b05913c4b3362c50988d3837db7823a967b651e1f066b8cc.bin
-
Size
1.1MB
-
MD5
1c1aed6897e399e9ad0afa887370dbe9
-
SHA1
52b8ec43ba94b2244ffef3f7a57ba4e7dd9bc376
-
SHA256
6d56dad02e1c2605b05913c4b3362c50988d3837db7823a967b651e1f066b8cc
-
SHA512
7e03e8fd4da627ce54cd68737180828ef8d0a21a811ec00c4d73320b7bc42794ffd0266702f994c6e19d5f3597ea25d5f83b17b1161ca02040a1cf71fc4d98f3
-
SSDEEP
24576:Ti1wlIMotJvnFxgmxChd+FUGCnwiRIr5tjyXUg/ZgJ/Iv:TiiKxgmxM4UFwig5gXUg/1v
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Requests enabling of the accessibility settings.
-
Acquires the wake lock
-
Reads information about phone network operator.
-