Analysis
-
max time kernel
1565091s -
max time network
162s -
platform
android_x64 -
resource
android-x64-20220621-en -
resource tags
androidarch:x64arch:x86image:android-x64-20220621-enlocale:en-usos:android-10-x64system -
submitted
02-08-2022 06:36
Behavioral task
behavioral1
Sample
GoogleMaps.apk
Resource
android-x86-arm-20220621-en
android-9-x86
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
GoogleMaps.apk
Resource
android-x64-20220621-en
android-10-x64
3 signatures
150 seconds
Behavioral task
behavioral3
Sample
GoogleMaps.apk
Resource
android-x64-arm64-20220621-en
android-11-x64
0 signatures
150 seconds
General
-
Target
GoogleMaps.apk
-
Size
907KB
-
MD5
ea449f22d8dd8d8fe8732dd96d69cb99
-
SHA1
d0656d504fabddb0bccc284976120e1a8299dcde
-
SHA256
16d5b53c646a760a91b2663ec75035d4a999d4440fbc52e8a96d292d5bee947a
-
SHA512
0da0a54de3cc28d3d8f8e44748aa2359f048f4c21d319fb2941bd2b4866bb53abdd857b5f27a346daa5b7f79b9a68af89baff598133fb8fe0c1633a820328fe7
Score
10/10
Malware Config
Extracted
Family
ermac
AES_key
AES_key
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.ceveluriseze.xuca