General
-
Target
5e0fc93b7a51c6a02d2d987a49d56a85ff18e02971f2cb7c38d5fc839b516e61.bin
-
Size
3.5MB
-
Sample
240320-1w3rtsdc7x
-
MD5
abc112e36234181d24e88c75b6619636
-
SHA1
0c2236f7ccc076d4b216643eafd5c4f7c5371107
-
SHA256
5e0fc93b7a51c6a02d2d987a49d56a85ff18e02971f2cb7c38d5fc839b516e61
-
SHA512
b94c636fa634e03ba5bea711332d540686e6cd9729fde2dbf3af237ebad0e283d3bf4142a626f3b7b3491ae84d24307b27b404ec0bf057c1e3de7adfe42418f5
-
SSDEEP
49152:BkO5Xv7w/+0wbGrROBGc033Y5DusgLOQZngQK+76fFyiVA0g+VMo2QQchg4mgecZ:B9Xzw/ybGsG6EsgLXd5KeRLupFtZ
Behavioral task
behavioral1
Sample
5e0fc93b7a51c6a02d2d987a49d56a85ff18e02971f2cb7c38d5fc839b516e61.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
5e0fc93b7a51c6a02d2d987a49d56a85ff18e02971f2cb7c38d5fc839b516e61.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
5e0fc93b7a51c6a02d2d987a49d56a85ff18e02971f2cb7c38d5fc839b516e61.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
hook
http://191.252.178.207:8082/..
Targets
-
-
Target
5e0fc93b7a51c6a02d2d987a49d56a85ff18e02971f2cb7c38d5fc839b516e61.bin
-
Size
3.5MB
-
MD5
abc112e36234181d24e88c75b6619636
-
SHA1
0c2236f7ccc076d4b216643eafd5c4f7c5371107
-
SHA256
5e0fc93b7a51c6a02d2d987a49d56a85ff18e02971f2cb7c38d5fc839b516e61
-
SHA512
b94c636fa634e03ba5bea711332d540686e6cd9729fde2dbf3af237ebad0e283d3bf4142a626f3b7b3491ae84d24307b27b404ec0bf057c1e3de7adfe42418f5
-
SSDEEP
49152:BkO5Xv7w/+0wbGrROBGc033Y5DusgLOQZngQK+76fFyiVA0g+VMo2QQchg4mgecZ:B9Xzw/ybGsG6EsgLXd5KeRLupFtZ
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Reads information about phone network operator.
-