General

  • Target

    987_obf.apk

  • Size

    2.3MB

  • Sample

    220802-g3m56sdagp

  • MD5

    7b07d5510817ba128f6486293e579492

  • SHA1

    85e915ccf11001191af3b446350b0a24e5f36f31

  • SHA256

    7a57d72506882fc711d3f739c422ca865c9a2fb5246b9d0c459f017909711e40

  • SHA512

    06051628a03255bb4fed834204526335f9201ba8175944e0fbffe3a0432353f653c7feb0290bb225db07ac7a011dd90d563783897d5bb8ded8da60d38e67912a

Malware Config

Extracted

Family

ermac

AES_key
AES_key

Targets

    • Target

      987_obf.apk

    • Size

      2.3MB

    • MD5

      7b07d5510817ba128f6486293e579492

    • SHA1

      85e915ccf11001191af3b446350b0a24e5f36f31

    • SHA256

      7a57d72506882fc711d3f739c422ca865c9a2fb5246b9d0c459f017909711e40

    • SHA512

      06051628a03255bb4fed834204526335f9201ba8175944e0fbffe3a0432353f653c7feb0290bb225db07ac7a011dd90d563783897d5bb8ded8da60d38e67912a

    • Ermac

      An Android banking trojan first seen in July 2021.

    • Ermac2 payload

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks