General

  • Target

    d6365924607d333ff864dab3fbbdcd015af784f8.rl.zip

  • Size

    2.6MB

  • MD5

    c10c0ee0c81c0a65522b359f975c3cf4

  • SHA1

    dc6b5421205d9ca4d4391a0e91cd8559a4b5fc9d

  • SHA256

    d36d4bd064b17b8326248bc6fe0b23f62563c38651ca79120c615c1782bca733

  • SHA512

    7ad2b3e18990044a30e4eef1321748b310d9a6d6fd7615c127faa26d2802d8562fcc46f1554fd06b04a57b8715ba05941853b5a2dd837828feebd16f7d29d653

  • SSDEEP

    49152:TSluvlQx+kVQMm0BzD5pDDLSzgNVM/LjCXC5TuDCmzTGa+VgUJ8jqdHUlv:mEWIQbSzgNVRyVQz5ugUJ8GSv

Score
10/10

Malware Config

Signatures

  • Ermac family
  • Ermac2 payload 1 IoCs
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 2 IoCs
  • Requests dangerous framework permissions 15 IoCs

Files

  • d6365924607d333ff864dab3fbbdcd015af784f8.rl.zip
    .zip

    Password: infected

  • d6365924607d333ff864dab3fbbdcd015af784f8.rl
    .apk android

    com.tencent.mm

    com.tencent.mm.retovasewenepo