General

  • Target

    signed.apk

  • Size

    8.4MB

  • Sample

    230204-24dy4sfa46

  • MD5

    04f9f15fafe185a87406cfab414f1d82

  • SHA1

    e7c818ba772c05c2651577289cc696b193f4883b

  • SHA256

    232b31136ca516af6f62abe4dd07fd86edb8be698dca86d4dd27ed284206404a

  • SHA512

    ef9f68e9f50b477a4a48b571dcd809b1f92ee75960e2827db69408111e61d599220a5350fa3dc22f200fa784d6ebf6fb1726e22b1bfb966209bf7ac88a0046cf

  • SSDEEP

    196608:ZCDDMksCXzgAh+9WoBETw1OYkLJtaJ+KwXLk6I/oJ30jlEaukioEQOYz+:wDQksUogoac1ODDakKwXg6bN0JhlDA

Malware Config

Extracted

Family

ermac

C2

http://185.215.113.81:3000

Blowfish_key
AES_key

Extracted

Family

cerberus

C2

http://185.215.113.81:3000

Blowfish_key
AES_key

Targets

    • Target

      signed.apk

    • Size

      8.4MB

    • MD5

      04f9f15fafe185a87406cfab414f1d82

    • SHA1

      e7c818ba772c05c2651577289cc696b193f4883b

    • SHA256

      232b31136ca516af6f62abe4dd07fd86edb8be698dca86d4dd27ed284206404a

    • SHA512

      ef9f68e9f50b477a4a48b571dcd809b1f92ee75960e2827db69408111e61d599220a5350fa3dc22f200fa784d6ebf6fb1726e22b1bfb966209bf7ac88a0046cf

    • SSDEEP

      196608:ZCDDMksCXzgAh+9WoBETw1OYkLJtaJ+KwXLk6I/oJ30jlEaukioEQOYz+:wDQksUogoac1ODDakKwXg6bN0JhlDA

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Ermac

      An Android banking trojan first seen in July 2021.

    • Ermac payload

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks