Analysis

  • max time kernel
    2297176s
  • max time network
    150s
  • platform
    android_x86
  • resource
    android-x86-arm-20220310-en
  • submitted
    03-05-2022 07:56

General

  • Target

    psk.apk

  • Size

    1.9MB

  • MD5

    49305965693a47cac8fe54d325d50d1f

  • SHA1

    7b7fbbe3f02ead6e985cf4619948ce003b4eb3f3

  • SHA256

    0dc975df4f929ed0422fb5c9a9582d3d5e11ab176cc3176e269b2a456d48d571

  • SHA512

    afdccaa0a03046355adfed5526cdec0881f68b6073eb0a574b21b08cc9abafda4ac8fe0ec6382881fb641a38b33b9f5f617ff822db7d8ef4bd5c32fbeec70322

Malware Config

Extracted

Family

ermac

C2

http://193.106.191.118:3434

AES_key
AES_key

Signatures

  • Ermac

    An Android banking trojan first seen in July 2021.

  • Ermac2 payload 2 IoCs
  • Makes use of the framework's Accessibility service. 3 IoCs
  • Acquires the wake lock. 1 IoCs
  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Reads information about phone network operator.
  • Removes a system notification. 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data). 1 IoCs

Processes

  • com.mazocexayori.kute
    1⤵
    • Makes use of the framework's Accessibility service.
    • Acquires the wake lock.
    • Loads dropped Dex/Jar
    • Removes a system notification.
    • Uses Crypto APIs (Might try to encrypt user data).
    PID:5136
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.mazocexayori.kute/app_DynamicOptDex/UjucuA.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.mazocexayori.kute/app_DynamicOptDex/oat/x86/UjucuA.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:5173

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.mazocexayori.kute/app_DynamicOptDex/UjucuA.json

    Filesize

    455KB

    MD5

    dd7df6c80724b39b9b028400c5f3c6f1

    SHA1

    66439f9f7aea2c686d663f50853ce39e24f12751

    SHA256

    8c49479ae97821063c9d7caefb17757db99f5d10aa110704f596b22a82439d97

    SHA512

    5cc610ee7b9a57ff4d5b5b0dc95938046a76233feda9ae98b9f7ee98ee97b02e6385a5c56410b31489cf1093ed2ad87f3add08e45cd9dad1f0584af15f2ff584

  • /data/user/0/com.mazocexayori.kute/app_DynamicOptDex/UjucuA.json

    Filesize

    899KB

    MD5

    4a5197f9217622442cd5a6184973fbca

    SHA1

    83dbd82074429fd14f5c6a9469b2aa6e05ff3a07

    SHA256

    65d77298d0bd4681dbef3a6240d0a982fb3dd1f8b622a6c202b59a16fe244169

    SHA512

    06486b4797d570ee96d47139b4b9e0742c3e565a6fd59643996f3fb1de900ff7bf13f909090685be51eb1bb797a9e7ae4bdaa47e52c7151330b5a458701e9b71

  • /data/user/0/com.mazocexayori.kute/app_DynamicOptDex/UjucuA.json

    Filesize

    899KB

    MD5

    469e764d83595045fb5f0d08b03adb3a

    SHA1

    9b31424e2be9320e4484235691c2e39aaf870271

    SHA256

    d4e5fc87c9c19bcaa58bd78327d7eb240c983435cd6eaa772424c4166248177c

    SHA512

    7caca18d874d3731cc7a5ebfc9f1ddfe87793557e00b5592e909f333f6e1a1dbb12040132d51ba02567360720d54e716102c212f711b9a80ceec8c3f1194e56f