Analysis

  • max time kernel
    735199s
  • platform
    android_x86
  • resource
    android-x86-arm
  • submitted
    28-09-2021 09:48

General

  • Target

    65619e3afe53268f5cbe5eae6a429f23e712c4412eda8c70dcfd3ebb25382894.apk

  • Size

    4.1MB

  • MD5

    d070db0597d0e5231b561a92bda0aec1

  • SHA1

    2aef7b1f2ec453489a3b4f5fde5d0bec2129fa05

  • SHA256

    65619e3afe53268f5cbe5eae6a429f23e712c4412eda8c70dcfd3ebb25382894

  • SHA512

    2b9c6ba83d25d6f4f5791f0b7041bac04cb179e880a80884357504559dfcebffdea1e06c0f6bfe326f6e7ecd9863b7a6ad4f839d0626d20c540cdc16d860bcbb

Malware Config

Signatures

  • Ermac

    An android banking trojan first seen in July 2021.

  • Ermac Payload 1 IoCs
  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
  • Uses reflection 47 IoCs

Processes

  • com.czxvfknrqnqv.huslcn
    1⤵
    • Loads dropped Dex/Jar
    • Uses Crypto APIs (Might try to encrypt user data).
    • Uses reflection
    PID:5008
    • com.czxvfknrqnqv.huslcn
      2⤵
        PID:5036
      • /system/bin/dex2oat
        2⤵
        • Loads dropped Dex/Jar
        PID:5036

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads