General
-
Target
645009f54f905fc1028e14d6277f554b7488a554ae1ad23ab178b912956e6f52
-
Size
2.8MB
-
Sample
240325-pwav9sag5s
-
MD5
375b10c55c8cb7b29524fe417d243396
-
SHA1
52be64e2b7813ad5be64698fc15f9a58de89b904
-
SHA256
645009f54f905fc1028e14d6277f554b7488a554ae1ad23ab178b912956e6f52
-
SHA512
b9257eb55c6265f6f97cfe118f677e57cff66a2ccbe39a14442218ed3a5d489e5c21a89e4e4df4805f515a204e9f3fb0ad580b1e05f063aad1969ed47040b1ff
-
SSDEEP
49152:ver8veugaZqoQdIU7MIVZz9AAFGpVc1KjrTCnsby0tCWelLpG/Xx3g/g8:ver8veu9qoQdIU4yqKKn9Vt2AXz8
Behavioral task
behavioral1
Sample
645009f54f905fc1028e14d6277f554b7488a554ae1ad23ab178b912956e6f52.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
645009f54f905fc1028e14d6277f554b7488a554ae1ad23ab178b912956e6f52.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
645009f54f905fc1028e14d6277f554b7488a554ae1ad23ab178b912956e6f52.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
hook
http://109.107.182.168:3434
Targets
-
-
Target
645009f54f905fc1028e14d6277f554b7488a554ae1ad23ab178b912956e6f52
-
Size
2.8MB
-
MD5
375b10c55c8cb7b29524fe417d243396
-
SHA1
52be64e2b7813ad5be64698fc15f9a58de89b904
-
SHA256
645009f54f905fc1028e14d6277f554b7488a554ae1ad23ab178b912956e6f52
-
SHA512
b9257eb55c6265f6f97cfe118f677e57cff66a2ccbe39a14442218ed3a5d489e5c21a89e4e4df4805f515a204e9f3fb0ad580b1e05f063aad1969ed47040b1ff
-
SSDEEP
49152:ver8veugaZqoQdIU7MIVZz9AAFGpVc1KjrTCnsby0tCWelLpG/Xx3g/g8:ver8veu9qoQdIU4yqKKn9Vt2AXz8
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Acquires the wake lock
-
Reads information about phone network operator.
-