Analysis
-
max time kernel
1384036s -
max time network
15s -
platform
android_x86 -
resource
android-x86-arm-20220823-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20220823-enlocale:en-usos:android-9-x86system -
submitted
07-11-2022 15:28
Static task
static1
Behavioral task
behavioral1
Sample
easy.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
easy.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
easy.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
easy.apk
-
Size
4.5MB
-
MD5
2cb58ccb6461e4fe22bb22c0a5f78f9e
-
SHA1
c3b7edb3536045d3b81ad53c10405f04cf63bb3b
-
SHA256
67ea3d38bed6ccdaeb3d929edd5afed9b1563d284a291f96e5bfa1c440e1a6dc
-
SHA512
7245bebb6d9ef67469c6e7ece51f7fd8c74642cf2be7dd3a6519fc1c2ac7d196628db6f773ab939cb4386c180546dfdf5be930e0a8e3981d066a62b25768a913
-
SSDEEP
98304:X9Aa3ecc0RLn60fR/1pL2LtrTCqcXuJt+jMWdJQ:XCOx2tc5MWdJQ
Malware Config
Extracted
ermac
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac2 payload 2 IoCs
resource yara_rule behavioral1/memory/4073-0.dex family_ermac2 behavioral1/memory/4035-0.dex family_ermac2 -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.blyyglzra.gcptyqoak/tyjjghkggi/dGd97dgghohgy8f/base.apk.heUUyjG1.oht 4073 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.blyyglzra.gcptyqoak/tyjjghkggi/dGd97dgghohgy8f/base.apk.heUUyjG1.oht --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.blyyglzra.gcptyqoak/tyjjghkggi/dGd97dgghohgy8f/oat/x86/base.apk.heUUyjG1.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.blyyglzra.gcptyqoak/tyjjghkggi/dGd97dgghohgy8f/base.apk.heUUyjG1.oht 4035 com.blyyglzra.gcptyqoak -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.blyyglzra.gcptyqoak
Processes
-
com.blyyglzra.gcptyqoak1⤵
- Loads dropped Dex/Jar
- Uses Crypto APIs (Might try to encrypt user data).
PID:4035 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.blyyglzra.gcptyqoak/tyjjghkggi/dGd97dgghohgy8f/base.apk.heUUyjG1.oht --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.blyyglzra.gcptyqoak/tyjjghkggi/dGd97dgghohgy8f/oat/x86/base.apk.heUUyjG1.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4073
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5b1074aaa5e3a196fdbc360efb888cc6f
SHA10bb22b772936ef3f0ae0a58a355ebb4862ef2634
SHA25678755a9b116fa2fddb631868ebf42ec4b4d716f428805a2cfc9753ad342ba7d2
SHA5122fae1ec6e541c52838789b7ec4922efafcde9bb1d9cfdd35f6031a84ad15ef148f933b962668bd22ad84b44157fa29bd94519160e337455747caf0518a7ea112
-
Filesize
136B
MD54daf813392aa372d8c146e024f95496f
SHA1f81fde61a7e98f538524e5ece6a5084116dc2d50
SHA25612befdd7862a215128730c89b70053357721a91f7528a226a307c4824a6fe761
SHA5120be7cfe74cff83c686828ca49e55f1939ab1a0a5ffedc4547b0633f87714531a95b6ce7a258fd283b97e8afed9c1a82b6ca2f7f3e222d3eccaea6e4f03f260d7
-
Filesize
1.4MB
MD56a9504e8a50aa3e33f824b864ca814a6
SHA151a81afb0e55f14ece0002188b70e1707c8d8c31
SHA256bbd73a3e6222b9fa11482d05848c9958be853404c5b364a27f269d143fefdbc1
SHA512cb62fab63dccb4cb19aa476e5031a3c528a312d23d40095e1655a1e8d88fb362b826f1dd83e090e16d51299d7d4bee4ff452acbb412f5a1037a451dee8a782c9
-
Filesize
1.4MB
MD59a7d633f75564ce5efa3b07fe0256742
SHA17069a052192c0f23309909d7ef2d831c0be628ed
SHA256c9d6b21411d4e89cf0b140240c74a406bf1138075c7c47e07231ec3fd84385bd
SHA512119bb85e808620b4ac977084e8b19b88e72ede53d3e06498ca8af3d2f6e8be50b00deea56d572a71ea92287d8622efe08c7566301d06d154f9f23ab617617638