General

  • Target

    110.apk

  • Size

    2.1MB

  • Sample

    220802-g3cpfabgg6

  • MD5

    aaf8cd2c4ac88b48e79736bbe53c114a

  • SHA1

    b3482f2c97fea3e03d8221eeb2f116c4a18588c1

  • SHA256

    71927786fc16e90fe05e1eb032c3591d878c7cfd197d02113d7d006e2d7b171f

  • SHA512

    ba62a4a1900cc0c2d618775ce9892c5df153dde032954e539f73133fbc2ed5303e112ca4b24d9cc804972b434fed1fedf4af55d70db600e19efa173fe16a47c3

Malware Config

Extracted

Family

ermac

AES_key
AES_key

Targets

    • Target

      110.apk

    • Size

      2.1MB

    • MD5

      aaf8cd2c4ac88b48e79736bbe53c114a

    • SHA1

      b3482f2c97fea3e03d8221eeb2f116c4a18588c1

    • SHA256

      71927786fc16e90fe05e1eb032c3591d878c7cfd197d02113d7d006e2d7b171f

    • SHA512

      ba62a4a1900cc0c2d618775ce9892c5df153dde032954e539f73133fbc2ed5303e112ca4b24d9cc804972b434fed1fedf4af55d70db600e19efa173fe16a47c3

    • Ermac

      An Android banking trojan first seen in July 2021.

    • Ermac2 payload

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks