Analysis
-
max time kernel
3209265s -
max time network
152s -
platform
android_x86 -
resource
android-x86-arm-20220621-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20220621-enlocale:en-usos:android-9-x86system -
submitted
21-08-2022 07:21
Static task
static1
Behavioral task
behavioral1
Sample
4d291ffddce396d078d16f10c35d5e2e.apk
Resource
android-x86-arm-20220621-en
Behavioral task
behavioral2
Sample
4d291ffddce396d078d16f10c35d5e2e.apk
Resource
android-x64-20220621-en
Behavioral task
behavioral3
Sample
4d291ffddce396d078d16f10c35d5e2e.apk
Resource
android-x64-arm64-20220621-en
General
-
Target
4d291ffddce396d078d16f10c35d5e2e.apk
-
Size
3.6MB
-
MD5
4d291ffddce396d078d16f10c35d5e2e
-
SHA1
1d9727aaf55191c9876e7c4b376dc2a6dd027a06
-
SHA256
0892942b07717a4fdef6639d02c56ce6ddb8e599529d299facaeda1c0cb16808
-
SHA512
1157293368632554da526e7795b1761877333e9d8eba34ccb21a45305aa88d58781ab42e5a7dfcd279ed23cc6317c6edf0609a175927551919ef60994da02452
Malware Config
Extracted
ermac
http://62.204.41.98:3434
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Makes use of the framework's Accessibility service. 3 IoCs
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.cwblsehgz.ochxfcflb Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.cwblsehgz.ochxfcflb Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.cwblsehgz.ochxfcflb -
Acquires the wake lock. 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.cwblsehgz.ochxfcflb -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.cwblsehgz.ochxfcflb/khkjgU8hgy/dga6oI6gbIHjs4j/base.apk.yakhfds1.hkk 4558 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.cwblsehgz.ochxfcflb/khkjgU8hgy/dga6oI6gbIHjs4j/base.apk.yakhfds1.hkk --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.cwblsehgz.ochxfcflb/khkjgU8hgy/dga6oI6gbIHjs4j/oat/x86/base.apk.yakhfds1.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.cwblsehgz.ochxfcflb/khkjgU8hgy/dga6oI6gbIHjs4j/base.apk.yakhfds1.hkk 4388 com.cwblsehgz.ochxfcflb -
Reads information about phone network operator.
-
Removes a system notification. 1 IoCs
description ioc Process Framework service call android.app.INotificationManager.cancelNotificationWithTag com.cwblsehgz.ochxfcflb -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.cwblsehgz.ochxfcflb
Processes
-
com.cwblsehgz.ochxfcflb1⤵
- Makes use of the framework's Accessibility service.
- Acquires the wake lock.
- Loads dropped Dex/Jar
- Removes a system notification.
- Uses Crypto APIs (Might try to encrypt user data).
PID:4388 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.cwblsehgz.ochxfcflb/khkjgU8hgy/dga6oI6gbIHjs4j/base.apk.yakhfds1.hkk --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.cwblsehgz.ochxfcflb/khkjgU8hgy/dga6oI6gbIHjs4j/oat/x86/base.apk.yakhfds1.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4558
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD551e8c5c7c71dfb080e1eb97c793e9f98
SHA167d1a9b9e93c3bc1fbe999d1462604cfe9326d28
SHA256091d72cb1cfc62b88718dd21dd2a9f3d830d5ab584404be8b046bbcdb450c6e3
SHA512202041e305571dc80ea18a8968234c3e6353c52a81f8f37a66e625b39b8d5adfc74f7760a56a5adf1f621dfbb40b6d0f469cfb5b41aa61c90f660292fb5bc3be
-
Filesize
1.3MB
MD5ec1169d8d6412e6cd1146dbb40833dc1
SHA19376b58dbf56de90045611b176f92ef65578dc67
SHA2566d0e90239201e97f3a1711a2bd32e02cb6d242e078d9484db5188e45f0b15ea7
SHA512d307036b4aa93bcc4b7a6069413fab6bb18e5ddc7a8a951715fb8872b97e47ba0ff42af8ee5f455edb20945fae686165b8ed00f14475f490dc80d37ef891746a
-
Filesize
307B
MD53367fcca08ca113f682f5bb5a1c5622a
SHA1a2af9e42cc29f90074f353cd8699fd0fb1d88c55
SHA2565dde01b9b515a4d4366e6d8f119b98a4eed0b337bb6c9120fb869088734b99b7
SHA512df3c5e51282a3ab442899c08c63a009c404df2f457ab1d9fd44f75d05666258a02d285fa313172d15db738c4130b6e711667bb73395a378b75e844af4405619c