General

  • Target

    3fc0ef665382cc3a2c23100625a1fedf.apk

  • Size

    3.6MB

  • Sample

    220821-h3g5laeedl

  • MD5

    3fc0ef665382cc3a2c23100625a1fedf

  • SHA1

    b39fc47f0eb2d862a2b79ea3a88e0a8f46e6858d

  • SHA256

    e0d2b13e45213bbb392b8ac873879afb87ec89155b8234c61facbe060acb2fd0

  • SHA512

    c589240e0eea1a938a699be40be87b6b2c9f665494187be35b657ac95eb1d9fae4938eac26acfeae4324912a01c7eb84e3c358c84e0c934b0d9289b1e72ea17a

  • SSDEEP

    98304:mT+bUWnEptRTXkOTAZJqpCp3w/HpkEac4huDtP42BqjkT:BZnE4OO3UJkEa7hcpqY

Malware Config

Extracted

Family

ermac

C2

http://62.204.41.98:3434

AES_key
AES_key

Targets

    • Target

      3fc0ef665382cc3a2c23100625a1fedf.apk

    • Size

      3.6MB

    • MD5

      3fc0ef665382cc3a2c23100625a1fedf

    • SHA1

      b39fc47f0eb2d862a2b79ea3a88e0a8f46e6858d

    • SHA256

      e0d2b13e45213bbb392b8ac873879afb87ec89155b8234c61facbe060acb2fd0

    • SHA512

      c589240e0eea1a938a699be40be87b6b2c9f665494187be35b657ac95eb1d9fae4938eac26acfeae4324912a01c7eb84e3c358c84e0c934b0d9289b1e72ea17a

    • SSDEEP

      98304:mT+bUWnEptRTXkOTAZJqpCp3w/HpkEac4huDtP42BqjkT:BZnE4OO3UJkEa7hcpqY

    • Ermac

      An Android banking trojan first seen in July 2021.

    • Makes use of the framework's Accessibility service.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the unique device ID (IMEI, MEID, IMSI).

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks