It has been reported that an android malware, namely "Daam" is spreading, which is capable of stealing sensitive data, bypassing antivirus programs, and deploying ransomware on the targeted devices.
The Daam malware is communicating with various Android APK files to infect the device. It is being distributed through third-party websites or applications downloaded from untrusted/unknown sources.
Once it is placed in the device, the malware tries to bypass the security check of the device. After a successful attempt, it attempts to steal sensitive data, and permissions such as reading history and bookmarks, killing background processing, and reading call logs etc. It is also capable of hacking call recording, contacts, gaining access to the camera, modifying device passwords, capturing screenshots, stealing SMS, downloading/uploading files, etc., and transmitting to the C2 server from the victim's device.
The Daam malware utilizes the AES encryption algorithm to encrypt files in the victim's device. Then, other files are deleted from the local storage and leaving only the encrypted files with ".enc" extension and a ransom note "readme_now.txt".

Indicator of Compromise:
MD5 Hashes
- 49cfc64d9f0355fadc93679a86e92982
- 99580a341b486a2f8b177f20dc6f782e
- ee6aec48e19191ba6efc4c65ff45a88e
SHA 1 Hashes
- 67a3def7ad736df94c8c50947f785c0926142b69
- bc826967c90acc08f1f70aa018f5d13f31521b92
- f3b135555ae731b5499502f3b69724944ab367d5
SHA 256 Hashes
- 37d4c5a0ea070fe0a1a2703914bf442b4285658b31d220f974adcf953b041e11
- 184356d900a545a2d545ab96fa6dd7b46f881a1a80ed134db1c65225e8fa902b
- 0fdfbf20e59b28181801274ad23b951106c6f7a516eb914efd427b6617630f30
C2 URL
- hxxp://192.99.251[.]51:3000/socket.io/