General
-
Target
f9db7aecc5c0a5102fca21c0166cf2b4d00150ff1adb8fbf609c09461dcf8c04.bin
-
Size
2.8MB
-
Sample
240305-1w7e1sbf97
-
MD5
176c428b54970b3bbfb6931ead77003c
-
SHA1
6b056ff3c8dc76a62a96231abdf95f8f04b7ba2a
-
SHA256
f9db7aecc5c0a5102fca21c0166cf2b4d00150ff1adb8fbf609c09461dcf8c04
-
SHA512
e7ad56235fedfcf92a79cae4755afd9ea158249cb218098bfb3dce82824d37acf34506510fd011babff6266097ebdee4b21fc7f6c8c9a72ebdaed4ae72d2af72
-
SSDEEP
49152:zYHNjVlWPHYX8248jyBNDlYS9qBVSoAhtSsuhaEdn5PowLbo2msM30knQsPCJ2DW:gtVCu8248j2NDlhqBVSocuhaEdn5PowV
Behavioral task
behavioral1
Sample
f9db7aecc5c0a5102fca21c0166cf2b4d00150ff1adb8fbf609c09461dcf8c04.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
f9db7aecc5c0a5102fca21c0166cf2b4d00150ff1adb8fbf609c09461dcf8c04.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
f9db7aecc5c0a5102fca21c0166cf2b4d00150ff1adb8fbf609c09461dcf8c04.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
hook
Targets
-
-
Target
f9db7aecc5c0a5102fca21c0166cf2b4d00150ff1adb8fbf609c09461dcf8c04.bin
-
Size
2.8MB
-
MD5
176c428b54970b3bbfb6931ead77003c
-
SHA1
6b056ff3c8dc76a62a96231abdf95f8f04b7ba2a
-
SHA256
f9db7aecc5c0a5102fca21c0166cf2b4d00150ff1adb8fbf609c09461dcf8c04
-
SHA512
e7ad56235fedfcf92a79cae4755afd9ea158249cb218098bfb3dce82824d37acf34506510fd011babff6266097ebdee4b21fc7f6c8c9a72ebdaed4ae72d2af72
-
SSDEEP
49152:zYHNjVlWPHYX8248jyBNDlYS9qBVSoAhtSsuhaEdn5PowLbo2msM30knQsPCJ2DW:gtVCu8248j2NDlhqBVSocuhaEdn5PowV
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Requests enabling of the accessibility settings.
-
Acquires the wake lock
-
Reads information about phone network operator.
-