General

  • Target

    65619e3afe53268f5cbe5eae6a429f23e712c4412eda8c70dcfd3ebb25382894.apk

  • Size

    4.1MB

  • Sample

    210928-ltakyabfbq

  • MD5

    d070db0597d0e5231b561a92bda0aec1

  • SHA1

    2aef7b1f2ec453489a3b4f5fde5d0bec2129fa05

  • SHA256

    65619e3afe53268f5cbe5eae6a429f23e712c4412eda8c70dcfd3ebb25382894

  • SHA512

    2b9c6ba83d25d6f4f5791f0b7041bac04cb179e880a80884357504559dfcebffdea1e06c0f6bfe326f6e7ecd9863b7a6ad4f839d0626d20c540cdc16d860bcbb

Malware Config

Targets

    • Target

      65619e3afe53268f5cbe5eae6a429f23e712c4412eda8c70dcfd3ebb25382894.apk

    • Size

      4.1MB

    • MD5

      d070db0597d0e5231b561a92bda0aec1

    • SHA1

      2aef7b1f2ec453489a3b4f5fde5d0bec2129fa05

    • SHA256

      65619e3afe53268f5cbe5eae6a429f23e712c4412eda8c70dcfd3ebb25382894

    • SHA512

      2b9c6ba83d25d6f4f5791f0b7041bac04cb179e880a80884357504559dfcebffdea1e06c0f6bfe326f6e7ecd9863b7a6ad4f839d0626d20c540cdc16d860bcbb

    • Ermac

      An android banking trojan first seen in July 2021.

    • Ermac Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks