Analysis

  • max time kernel
    1869053s
  • max time network
    123s
  • platform
    android_x86
  • resource
    android-x86-arm
  • submitted
    18-01-2022 22:54

General

  • Target

    fd7e7e.apk

  • Size

    7.9MB

  • MD5

    82ffff3a21f4c819ef87c3a0a814a3db

  • SHA1

    371b09369d2337d93d557e5835db12a1cf3b848b

  • SHA256

    fd7e7e23db5f645db9ed47a5d36e7cf57ca2dbdf46a37484eafa1e04f657bf02

  • SHA512

    c1b554b115fbb66d20db91e73ffaeff78be1925fc35a550e839ca1855051a8d34fb9816eab30e52ac2d17826ea5775b9400e9982c9a9f367b80cc096a61b3221

Malware Config

Signatures

  • Ermac

    An android banking trojan first seen in July 2021.

  • Ermac Payload 3 IoCs
  • Makes use of the framework's Accessibility service. 1 IoCs
  • Loads dropped Dex/Jar 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Uses Crypto APIs (Might try to encrypt user data). 1 IoCs

Processes

  • com.tag.right
    1⤵
    • Makes use of the framework's Accessibility service.
    • Loads dropped Dex/Jar
    • Uses Crypto APIs (Might try to encrypt user data).
    PID:4923
    • com.tag.right
      2⤵
        PID:5022
      • /system/bin/dex2oat
        2⤵
        • Loads dropped Dex/Jar
        PID:5022

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads