General
-
Target
3c21e47c0430495ca819255c0bfde2d30d1e121dc09d174f3bf4d5797929f2a1.bin
-
Size
1.1MB
-
Sample
240305-1y4f5sag5t
-
MD5
397d193739f87a3c4ed4a5fb9cf8f43a
-
SHA1
e30b5f0a984dc3200e55db689ed5defed5efaad3
-
SHA256
3c21e47c0430495ca819255c0bfde2d30d1e121dc09d174f3bf4d5797929f2a1
-
SHA512
58a1ad4e3ebd5cf7dbc82ddb6ec9acf00a25a62ee620c480e9ec4d329edbba0df3ad78d80b4eb11687687611ef55a522ac1dfe131a9667e841e97f72e92017a5
-
SSDEEP
24576:a6NKl7FvoGo1DMRaeq2lfnXTB2I3hmW3+NUr1ojXmhP07aUdg/bMpk:a6UD+DMR0iJhL+Ii2hPXUdg/0k
Behavioral task
behavioral1
Sample
3c21e47c0430495ca819255c0bfde2d30d1e121dc09d174f3bf4d5797929f2a1.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
3c21e47c0430495ca819255c0bfde2d30d1e121dc09d174f3bf4d5797929f2a1.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
3c21e47c0430495ca819255c0bfde2d30d1e121dc09d174f3bf4d5797929f2a1.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
hook
Targets
-
-
Target
3c21e47c0430495ca819255c0bfde2d30d1e121dc09d174f3bf4d5797929f2a1.bin
-
Size
1.1MB
-
MD5
397d193739f87a3c4ed4a5fb9cf8f43a
-
SHA1
e30b5f0a984dc3200e55db689ed5defed5efaad3
-
SHA256
3c21e47c0430495ca819255c0bfde2d30d1e121dc09d174f3bf4d5797929f2a1
-
SHA512
58a1ad4e3ebd5cf7dbc82ddb6ec9acf00a25a62ee620c480e9ec4d329edbba0df3ad78d80b4eb11687687611ef55a522ac1dfe131a9667e841e97f72e92017a5
-
SSDEEP
24576:a6NKl7FvoGo1DMRaeq2lfnXTB2I3hmW3+NUr1ojXmhP07aUdg/bMpk:a6UD+DMR0iJhL+Ii2hPXUdg/0k
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Requests enabling of the accessibility settings.
-
Acquires the wake lock
-
Reads information about phone network operator.
-