com.obfuscapk.demo.MainActivity
android.intent.action.MAIN
Overview
overview
10Static
static
10www/backen...ate.sh
windows7-x64
3www/backen...ate.sh
windows10-2004-x64
3www/backen...ler.js
windows7-x64
1www/backen...ler.js
windows10-2004-x64
1www/backen...ler.js
windows7-x64
1www/backen...ler.js
windows10-2004-x64
1www/backen...ler.js
windows7-x64
1www/backen...ler.js
windows10-2004-x64
1www/backen...ler.js
windows7-x64
1www/backen...ler.js
windows10-2004-x64
1www/backen...rce.js
windows7-x64
1www/backen...rce.js
windows10-2004-x64
1www/backen...der.js
windows7-x64
1www/backen...der.js
windows10-2004-x64
1www/backen...ice.js
windows7-x64
1www/backen...ice.js
windows10-2004-x64
1www/backen...ice.js
windows7-x64
1www/backen...ice.js
windows10-2004-x64
1www/backend/artisan
ubuntu-18.04-amd64
1www/backend/artisan
debian-9-armhf
7www/backend/artisan
debian-9-mips
1www/backend/artisan
debian-9-mipsel
7www/backen...er.ps1
windows7-x64
1www/backen...er.ps1
windows10-2004-x64
1www/backen...l.html
windows7-x64
1www/backen...l.html
windows10-2004-x64
1www/backen...p.html
windows7-x64
1www/backen...p.html
windows10-2004-x64
1www/backen...e.html
windows7-x64
1www/backen...e.html
windows10-2004-x64
1www/backen...d.html
windows7-x64
1www/backen...d.html
windows10-2004-x64
1Behavioral task
behavioral1
Sample
www/backend/23.02.2023-update.sh
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
www/backend/23.02.2023-update.sh
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
www/backend/app/Http/Controllers/Api/v1/AutoCommandsController.js
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
www/backend/app/Http/Controllers/Api/v1/AutoCommandsController.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
www/backend/app/Http/Controllers/Api/v1/Bot/BotInjectionController.js
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
www/backend/app/Http/Controllers/Api/v1/Bot/BotInjectionController.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
www/backend/app/Http/Controllers/Api/v1/LogController.js
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
www/backend/app/Http/Controllers/Api/v1/LogController.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
www/backend/app/Http/Controllers/Api/v1/UserController.js
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
www/backend/app/Http/Controllers/Api/v1/UserController.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
www/backend/app/Http/Resources/Bot/BotResource.js
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
www/backend/app/Http/Resources/Bot/BotResource.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
www/backend/app/Providers/RouteServiceProvider.js
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
www/backend/app/Providers/RouteServiceProvider.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
www/backend/app/Services/InjectionsService.js
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
www/backend/app/Services/InjectionsService.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
www/backend/app/Services/LogsService/LogsService.js
Resource
win7-20240319-en
Behavioral task
behavioral18
Sample
www/backend/app/Services/LogsService/LogsService.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
www/backend/artisan
Resource
ubuntu1804-amd64-20240226-en
Behavioral task
behavioral20
Sample
www/backend/artisan
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral21
Sample
www/backend/artisan
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral22
Sample
www/backend/artisan
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral23
Sample
www/backend/database/seeders/RolesSeeder.ps1
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
www/backend/database/seeders/RolesSeeder.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
www/backend/public/injects/html/banks/ae.ahb.digital.html
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
www/backend/public/injects/html/banks/ae.ahb.digital.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
www/backend/public/injects/html/banks/ae.almasraf.mobileapp.html
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
www/backend/public/injects/html/banks/ae.almasraf.mobileapp.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
www/backend/public/injects/html/banks/ae.hsbc.hsbcuae.html
Resource
win7-20240319-en
Behavioral task
behavioral30
Sample
www/backend/public/injects/html/banks/ae.hsbc.hsbcuae.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
www/backend/public/injects/html/banks/air.app.scb.breeze.android.main.my.prod.html
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
www/backend/public/injects/html/banks/air.app.scb.breeze.android.main.my.prod.html
Resource
win10v2004-20240226-en
Target
ermac v3 çalışan panel.zip
Size
156.9MB
MD5
bc4734cbdeb2545eb1f1d4dc47d3f5e8
SHA1
731cbe0df75893f4dbca64e6d01e94a84bd051f7
SHA256
ef4e0e2593eaccc73632054c0244e858e1dc0bc1149cde36d74bf41fb03fddb4
SHA512
4cd775d35eabe12bd33e133bef681bc6013508b5d3545fe7f8e049e3c9715d0a09335286e50693dd35226462b72b226322d9fffa4b4c406cf7653bc9c5ae6f12
SSDEEP
3145728:dgr3gGFc1fR0v3nr37BjwCDQGpjKrHULKS8DhK9Inrl4QQS0PwlcdQ91LU5ukm0T:artFcwrBjwCDQ82r0GDdnZ4QQS+wlMQK
resource | yara_rule |
---|---|
static1/unpack001/www/builder/source/bot/src/main/java/com/amazon/zzz/ApiNm/apiUt.kt | family_ermac2 |
description | ioc |
---|---|
Allows an app to access approximate location. | android.permission.ACCESS_COARSE_LOCATION |
https://github.com/pkumza/LiteRadar
http://refhub.elsevier.com/S2352-7110(19)30279-1/sb1
http://refhub.elsevier.com/S2352-7110(19)30279-1/sb2
http://refhub.elsevier.com/S2352-7110(19)30279-1/sb3
http://refhub.elsevier.com/S2352-7110(19)30279-1/sb4
http://refhub.elsevier.com/S2352-7110(19)30279-1/sb5
http://refhub.elsevier.com/S2352-7110(19)30279-1/sb6
http://refhub.elsevier.com/S2352-7110(19)30279-1/sb7
http://refhub.elsevier.com/S2352-7110(19)30279-1/sb8
http://refhub.elsevier.com/S2352-7110(19)30279-1/sb10
http://refhub.elsevier.com/S2352-7110(19)30279-1/sb11
http://refhub.elsevier.com/S2352-7110(19)30279-1/sb12
http://refhub.elsevier.com/S2352-7110(19)30279-1/sb13
http://refhub.elsevier.com/S2352-7110(19)30279-1/sb14
http://refhub.elsevier.com/S2352-7110(19)30279-1/sb15
http://refhub.elsevier.com/S2352-7110(19)30279-1/sb16
http://refhub.elsevier.com/S2352-7110(19)30279-1/sb17
http://arxiv.org/abs/1808.04218
http://refhub.elsevier.com/S2352-7110(19)30279-1/sb19
http://refhub.elsevier.com/S2352-7110(19)30279-1/sb20
https://www.guardsquare.com/en/proguard
http://www.allatori.com
https://www.preemptive.com/products/dasho/overview
https://dexprotector.com
http://shield4j.com
http://refhub.elsevier.com/S2352-7110(19)30279-1/sb26
http://refhub.elsevier.com/S2352-7110(19)30279-1/sb27
http://refhub.elsevier.com/S2352-7110(19)30279-1/sb28
https://www.virustotal.com/gui/file/642da73bc4c78004304dfed2e6e704ebb352ff9f1db19a19cc2296c86164e723
https://www.virustotal.com
https://www.virustotal.com/gui/file/1fe6ad3bd534bf9f42cbdefa66e99db1760bb110d978dfb28517bd61fb5e9a16
https://www.virustotal.com/gui/file/e58332461b8151e842369a635fa01822289f45128c5d5afcc981c7cb2ba170d4
https://www.virustotal.com/gui/file/feddd8ac2ce246105c5df050061ea5dad8cb5da8411010646f3f9eb8dbbc1b44
https://www.virustotal.com/gui/file/356a5c92670b825d0bf3e2e927ce3f2ff3a407ad1b6e91119a8056391e665b0c
https://www.virustotal.com/gui/file/cc394ba746f55630d97f06df89d851438c866c6179e39eb5d706969ca7a40de0
https://www.androidrank.org/app/ranking?price=free
https://developer.android.com/studio/test/monkey.html
http://creativecommons.org/licenses/by-nc-nd/4.0/
http://www.elsevier.com/locate/softx
http://crossmark.crossref.org/dialog/?doi=10.1016/j.softx.2020.100403&domain=pdf
https://github.com/ElsevierSoftwareX/SOFTX_2019_275
https://doi.org/10.1016/j.softx.2020.100403
http://www.guardsquare.com/en/proguard.[AccessedJanuary24,2020].[22]Allatori.http://www.allatori.com.[AccessedJanuary24,2020].[23]DashO.https://www.preemptive.com/products/dasho/overview.[AccessedJanuary24,2020].[24]DexProtector.https://dexprotector.com.[AccessedJanuary24,2020].[25]Shield4J.http://shield4j.com.[AccessedJanuary24,2020].[26]MaiorcaD,AriuD,CoronaI,AresuM,GiacintoG.Stealthattacks:anextendedinsightintotheobfuscationeffectsonandroidmalware.ComputSecur2015;51:16
http://www.virustotal.com/gui/file/642da73bc4c78004304dfed2e6e704ebb352ff9f1db19a19cc2296c86164e723.[AccessedJanuary24,2020].[30]VirusTotal.https://www.virustotal.com.[AccessedJanuary24,2020].[31]CometBot
http://www.virustotal.com/gui/file/1fe6ad3bd534bf9f42cbdefa66e99db1760bb110d978dfb28517bd61fb5e9a16.[AccessedJanuary24,2020].[32]CometBot
http://www.virustotal.com/gui/file/e58332461b8151e842369a635fa01822289f45128c5d5afcc981c7cb2ba170d4.[AccessedJanuary24,2020].[33]CometBot
http://www.virustotal.com/gui/file/feddd8ac2ce246105c5df050061ea5dad8cb5da8411010646f3f9eb8dbbc1b44.[AccessedJanuary24,2020].[34]CometBot
http://www.virustotal.com/gui/file/356a5c92670b825d0bf3e2e927ce3f2ff3a407ad1b6e91119a8056391e665b0c.[AccessedJanuary24,2020].[35]CometBot
http://www.virustotal.com/gui/file/cc394ba746f55630d97f06df89d851438c866c6179e39eb5d706969ca7a40de0.[AccessedJanuary24,2020].[36]ANDROIDRANK
http://www.androidrank.org/app/ranking?price=free.[AccessedJanuary24,2020].[37]UI/applicationexercisermonkey.https://developer.android.com/studio/test/monkey.html.[AccessedJanuary24,2020].
http://www.elsevier.com/locate/softxen-usJournal
https://github.com/ElsevierSoftwareX/SOFTX_2019_275LegalCodeLicenseMITCodeversioningsystemusedgitSoftwarecodelanguages,tools,andservicesusedWritteninPython,testedandworkingonUbuntu18.04,Dockerimageavailable.Toolsneeded:apktool,jarsignerandzipalign.Compilationrequirements,operatingenvironments&dependenciesPythonpackages:pycryptodome,tqdm,virustotal-api,Yapsy.Supportemailforquestionsgabriel.georgiu@talos-sec.com1.MotivationandsignificanceObfuscationisasecuritythroughobscuritytechniquethatmod-ifiesthecodeinordertocounteractautomaticormanualcodeanalysis.However,itisconsideredasadouble-edgedswordbythesecuritycommunitybecausebothsoftwaredevelopersandmalwareauthorsfrequentlyuseobfuscation.Infact,ontheonehand,obfuscationkeepsdevelopers'competitorsawayfromcopyingthecodeandmakesitdifficultforattackerstoaltertheregularflowofthesoftware
http://gmail.com
https://doi.org/10.1016/j.softx.2020.1004032352-7110/'2020TheAuthors.PublishedbyElsevierB.V.ThisisanopenaccessarticleundertheCCBY-NC-NDlicense
android.intent.action.MAIN
android.permission.INTERNET
android.permission.VIBRATE
android.permission.ACCESS_NETWORK_STATE
android.permission.ACCESS_COARSE_LOCATION
android.intent.action.MAIN
android.permission.INTERNET
android.permission.VIBRATE
android.permission.ACCESS_NETWORK_STATE
android.permission.ACCESS_COARSE_LOCATION