General
-
Target
206c7ef42f47e0ca6edc2db4e5754d6ccd07ab915aea849e05b1c136a73ceee8.bin
-
Size
3.5MB
-
Sample
240320-1xy52add3x
-
MD5
515b179c5d1be69c73ebef0b63d92d92
-
SHA1
ab7aa1ad0f6b4c3f2ba8aee97e2f78ad3b75b646
-
SHA256
206c7ef42f47e0ca6edc2db4e5754d6ccd07ab915aea849e05b1c136a73ceee8
-
SHA512
c2c6315eab2ce575c8c80c750f0f1e8a7a6a7671c549dca8797e5db5651e884e2faa250678f5cf4cd711a19c82dc3d7ce20b122510d86b80bef141f0f9685646
-
SSDEEP
98304:+JyF7AlcUwUH6O6oVU3EHUWAjXv4BFkGV4PYwIoKAko2o:+0FcwADVU0HU3jwUKiYwbH
Behavioral task
behavioral1
Sample
206c7ef42f47e0ca6edc2db4e5754d6ccd07ab915aea849e05b1c136a73ceee8.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
206c7ef42f47e0ca6edc2db4e5754d6ccd07ab915aea849e05b1c136a73ceee8.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
206c7ef42f47e0ca6edc2db4e5754d6ccd07ab915aea849e05b1c136a73ceee8.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
hook
http://191.252.178.207:8082
Targets
-
-
Target
206c7ef42f47e0ca6edc2db4e5754d6ccd07ab915aea849e05b1c136a73ceee8.bin
-
Size
3.5MB
-
MD5
515b179c5d1be69c73ebef0b63d92d92
-
SHA1
ab7aa1ad0f6b4c3f2ba8aee97e2f78ad3b75b646
-
SHA256
206c7ef42f47e0ca6edc2db4e5754d6ccd07ab915aea849e05b1c136a73ceee8
-
SHA512
c2c6315eab2ce575c8c80c750f0f1e8a7a6a7671c549dca8797e5db5651e884e2faa250678f5cf4cd711a19c82dc3d7ce20b122510d86b80bef141f0f9685646
-
SSDEEP
98304:+JyF7AlcUwUH6O6oVU3EHUWAjXv4BFkGV4PYwIoKAko2o:+0FcwADVU0HU3jwUKiYwbH
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Requests enabling of the accessibility settings.
-
Acquires the wake lock
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-