General
-
Target
99cf8159cee928f87822031d7f88daf049b093a3619f644198d510cb692b6d03.bin
-
Size
996KB
-
Sample
240816-1yfp3szdla
-
MD5
e341707a05a7585b9fcb929a9a7bf3e7
-
SHA1
a92b3768eba6732b3f58e4a576e0627ae9624dac
-
SHA256
99cf8159cee928f87822031d7f88daf049b093a3619f644198d510cb692b6d03
-
SHA512
f8acc83c3727f6905115a1ec67c028a7de022cc4dc60d33e715367c513fcca95c3a92a16ed47ba2d29d000268b8e9dbca345c89eba38c2fd67d27754c8645685
-
SSDEEP
24576:17+gWPFQ8MffPRxkTi9b8w43WF3WkozFNveg//efF:NIM3R6CbakxYleg/mF
Behavioral task
behavioral1
Sample
99cf8159cee928f87822031d7f88daf049b093a3619f644198d510cb692b6d03.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
99cf8159cee928f87822031d7f88daf049b093a3619f644198d510cb692b6d03.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
99cf8159cee928f87822031d7f88daf049b093a3619f644198d510cb692b6d03.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
ermac
http://193.233.254.28:3434
Targets
-
-
Target
99cf8159cee928f87822031d7f88daf049b093a3619f644198d510cb692b6d03.bin
-
Size
996KB
-
MD5
e341707a05a7585b9fcb929a9a7bf3e7
-
SHA1
a92b3768eba6732b3f58e4a576e0627ae9624dac
-
SHA256
99cf8159cee928f87822031d7f88daf049b093a3619f644198d510cb692b6d03
-
SHA512
f8acc83c3727f6905115a1ec67c028a7de022cc4dc60d33e715367c513fcca95c3a92a16ed47ba2d29d000268b8e9dbca345c89eba38c2fd67d27754c8645685
-
SSDEEP
24576:17+gWPFQ8MffPRxkTi9b8w43WF3WkozFNveg//efF:NIM3R6CbakxYleg/mF
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Defense Evasion
Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3