General
-
Target
3ee0b5f142884ccd460b619f7a536b4c68d0d649e34ce477cfe97d18b9620453
-
Size
2.8MB
-
Sample
240313-rpddxsgg52
-
MD5
db6463dca0973bb704ac9fce68a1dd23
-
SHA1
c35ffe6ab3797981da3b8fd830d4d0b3f3b24e2e
-
SHA256
3ee0b5f142884ccd460b619f7a536b4c68d0d649e34ce477cfe97d18b9620453
-
SHA512
bdae2fe17fb616a22c8559083e30d23ae5030923bb3dd95f7bab6e7ba38d19a22fa3140048f6cd222b2bbdb5087c7b9524fd695877734b3f64c5c809144f4fd8
-
SSDEEP
49152:9OcwHfICXpT/JVb0Tnb3fj29kgzpWUYCHBSZyL1xB07DsiHDwJAC6lg/Go:cT/ICXlvb0/PjakgPYCHBSZC1XCYiHC1
Behavioral task
behavioral1
Sample
3ee0b5f142884ccd460b619f7a536b4c68d0d649e34ce477cfe97d18b9620453.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
3ee0b5f142884ccd460b619f7a536b4c68d0d649e34ce477cfe97d18b9620453.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
3ee0b5f142884ccd460b619f7a536b4c68d0d649e34ce477cfe97d18b9620453.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
hook
%INSERT_URL_HERE%
Targets
-
-
Target
3ee0b5f142884ccd460b619f7a536b4c68d0d649e34ce477cfe97d18b9620453
-
Size
2.8MB
-
MD5
db6463dca0973bb704ac9fce68a1dd23
-
SHA1
c35ffe6ab3797981da3b8fd830d4d0b3f3b24e2e
-
SHA256
3ee0b5f142884ccd460b619f7a536b4c68d0d649e34ce477cfe97d18b9620453
-
SHA512
bdae2fe17fb616a22c8559083e30d23ae5030923bb3dd95f7bab6e7ba38d19a22fa3140048f6cd222b2bbdb5087c7b9524fd695877734b3f64c5c809144f4fd8
-
SSDEEP
49152:9OcwHfICXpT/JVb0Tnb3fj29kgzpWUYCHBSZyL1xB07DsiHDwJAC6lg/Go:cT/ICXlvb0/PjakgPYCHBSZC1XCYiHC1
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Reads information about phone network operator.
-