Analysis
-
max time kernel
1977727s -
max time network
158s -
platform
android_x86 -
resource
android-x86-arm-20220823-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20220823-enlocale:en-usos:android-9-x86system -
submitted
12-04-2023 14:29
Static task
static1
Behavioral task
behavioral1
Sample
a1ea4dbd8a36c410fd528f81f197421c6a8b9b240dd274a87be66f199ad5cb74.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
a1ea4dbd8a36c410fd528f81f197421c6a8b9b240dd274a87be66f199ad5cb74.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
a1ea4dbd8a36c410fd528f81f197421c6a8b9b240dd274a87be66f199ad5cb74.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
a1ea4dbd8a36c410fd528f81f197421c6a8b9b240dd274a87be66f199ad5cb74.apk
-
Size
2.5MB
-
MD5
80eedb8d0b108ca485b80c70fc9c2d31
-
SHA1
7e549c9b8e02cfa696485ef43fa16d196f70bebc
-
SHA256
a1ea4dbd8a36c410fd528f81f197421c6a8b9b240dd274a87be66f199ad5cb74
-
SHA512
04e93ba7d30a609cf5c4de8598fceba3e09c4e323ff2e35ae05aefaf0b2008710c7829bd4ff9ebf44d62f76d3a6a5f06346acc24d5a0c46f3c5c5a91181cf49c
-
SSDEEP
49152:+Y4Hzl+bwEPg8240tzCW3sX77MXQw4CmE4i85W3//t:+JHzl+bn0tzCW3y77ZN7i852t
Malware Config
Extracted
ermac
http://91.215.85.23:3434
Extracted
hook
http://91.215.85.23:3434
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac2 payload 2 IoCs
resource yara_rule behavioral1/memory/4058-0.dex family_ermac2 behavioral1/memory/4013-0.dex family_ermac2 -
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service. 3 IoCs
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.waciniyehiruna.razo Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.waciniyehiruna.razo Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.waciniyehiruna.razo -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps). 1 IoCs
description ioc Process Framework service call android.content.pm.IPackageManager.getInstalledApplications com.waciniyehiruna.razo -
Acquires the wake lock. 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.waciniyehiruna.razo -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.waciniyehiruna.razo/app_DynamicOptDex/qZs.json 4058 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.waciniyehiruna.razo/app_DynamicOptDex/qZs.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.waciniyehiruna.razo/app_DynamicOptDex/oat/x86/qZs.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.waciniyehiruna.razo/app_DynamicOptDex/qZs.json 4013 com.waciniyehiruna.razo -
Reads information about phone network operator.
-
Removes a system notification. 1 IoCs
description ioc Process Framework service call android.app.INotificationManager.cancelNotificationWithTag com.waciniyehiruna.razo -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.waciniyehiruna.razo
Processes
-
com.waciniyehiruna.razo1⤵
- Makes use of the framework's Accessibility service.
- Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
- Acquires the wake lock.
- Loads dropped Dex/Jar
- Removes a system notification.
- Uses Crypto APIs (Might try to encrypt user data).
PID:4013 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.waciniyehiruna.razo/app_DynamicOptDex/qZs.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.waciniyehiruna.razo/app_DynamicOptDex/oat/x86/qZs.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4058
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
676KB
MD5ddb935b4cb89568b1126dbc47a099efd
SHA13f40ba69bd11380de6e56dab5a9cd5c53b150f0f
SHA256c4aea8f064d87cefbeb7898bd9f895bea5b82b756757c824191a11112b88af27
SHA512c674a76a21349cec07e2fba2cf91f884d8cca42d31eb3d750c8cffd2fcfacc95905e94676946f801d95d1cef4485b9fe5ed1bd5c34fcde3f73da935ac3a87527
-
Filesize
1.5MB
MD5eac07b6436ce480e5b46d7da4d7ec4e8
SHA1419cbf602adf1ef4d908f5bd5b90a2d2a94d6798
SHA2564865e8f50ef28e39bee1c9b88e9a632c85f3df6ea1f6b9ee7eb2b41bb39c5d82
SHA5126f0c389654a5ac6ad607e135ba975733e84b845533a482d7658d9a5b429b825dbe22c15d0535eb48094aa07a49bffa5fd9acc69a67a9200e66dad06362171fa7
-
Filesize
1.5MB
MD5b94fd56ee56fe358ac6b2f7e581aacf8
SHA14dab3e1bda0d164214245422cb05d5283e9b0566
SHA25664fbcfa549de412ebde7364d6984df08bf5223787d5ed49e099a55e38621b314
SHA512a5fe5223c6fa61fcfcba16ac7aaf530c982b9658a0a62176f1aa6902b1f17c2e564292446fea4e8f903c06676dc37351aa6339b436a990395e4f9ffd27bb6332
-
Filesize
20B
MD593027d42b314432c4216e6cfca48b384
SHA143448dd8102979c3926828182579691945eedd4e
SHA2563cda72e67c62e52a342309c44f2cb3b6c1019c7b11822e2f628e48e254e2b41c
SHA512a52d13cf7f5be196d1e2f135b8a010f80558c5d35e90e7792441d1c976517d55cf1c9587949db69ebef294cc6ef79529a65e7d779964793016efecacd152f70e
-
Filesize
48B
MD568dfaa7c973e1362b91f246f952d8481
SHA1bd8b3505a0e66267aa739853fd3d628e1e88c5ed
SHA256b310dfdb83a1c6791603ed98ec067d62f654b885c7ebcfeea422204499229631
SHA512b5c2a90b418ce87f67aa3bc8b05ca07e2a2c0350caa1203af2d11080c1bdee34f277dab98af67f926f06c175016db3a3a79604f3b2986b9c18bd1a1ed58aaf01
-
Filesize
48B
MD54c980aff172232fb1ade4f9197ced2c9
SHA1aeba143cf1d0395ff730cb9b7652ec2e561d2c07
SHA256235087616ed622ef875b45c96302e9a848c1992a5809ceea93ca896852369dfa
SHA51240eb60178277d4c0c91036b5473bf2ed64de93f8a0343710242e257d696aa41c0072ba825f9fb0d94e5f2b138eb4b0b58a69a3ffbcde1e66e9449910ca022179
-
Filesize
104KB
MD5dc79f9ce5f3ab5270b33e61119dfc959
SHA11844bf222a5144b513dcf2fb50a18c011701c647
SHA25647e65f4de08deabfd52ecdb8b0a29c61c482188b92c36182e2112ca0a8f4ff65
SHA51218b8894a7f35df516f423bbdebf1e05ce09eaf4345b139e59e603cadb81f8d1fa20f793438c28e8fd9a64e64f0684223d90ce6f10d3f93cb0c781049a8cff03e
-
Filesize
1KB
MD5a56c5dd2a291036462d2c79b243b886c
SHA1c4378aebb65d6707504d7ac96c1c27961608a738
SHA256aa0502967599f6a7ef6362849ce9772e8035b086d11fac886a03fa3b5054913a
SHA512cd841bc99ea15f7717fe5226175bfa8e5cf30d1611f2dbf8b7dd243e94df5948bcfb97d64c113b63c779b3a21ba526d0ebc600b81cb1dc3e71c7de42fa249cb5
-
Filesize
36B
MD504fd0e706a8031580a274d25960017a9
SHA111cfd11a04db457559fdf1890eaa484e4228a7d3
SHA2562d33fe1a2da3a092513640f09179b926cdb0b150899ceb315b0b3d0cc462c5c4
SHA512b3ae8249163ba9d40e75b2ac2e524e56f2321be3c735829a85cd5c15273940cca4581d4548bb50f8d7ab00eb61ec2bc8ebdf5496f9a781c355c56eee857feb59
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
524B
MD56aca6b2a1207fbbb31bd72fe856a5d0d
SHA127730a4fbb38e2427e5d8840805310c6fbb368e1
SHA256eb6dc2c3e5a1dac2fc759d9a2a753c3284abddbeca39828a96f0a333629ebd53
SHA5127c5417967bbe9544b7a2d7c1dc7be20de21e3215319d8fa624451a7c3dbae83418566beef29416e74be46fc5a5d6efb70f7a8a5412d8c84d054cf586dd592d1f
-
Filesize
8B
MD57dea362b3fac8e00956a4952a3d4f474
SHA105fe405753166f125559e7c9ac558654f107c7e9
SHA256af5570f5a1810b7af78caf4bc70a660f0df51e42baf91d4de5b2328de0e83dfc
SHA5121b7409ccf0d5a34d3a77eaabfa9fe27427655be9297127ee9522aa1bf4046d4f945983678169cb1a7348edcac47ef0d9e2c924130e5bcc5f0d94937852c42f1b
-
Filesize
173KB
MD5e8b497640a73f92c31942d41bef37009
SHA1a2fc266e760ea7b2417217474a9748da381fbd40
SHA256f331c8ccad15d34a35c44b6de9dffbfb98851c09b493d16cdd580323d91c1baf
SHA512ff398871acbc703fe7fcba9b03804d88b4f2d54c85759a31787833ee4c19cdf36edc3f09eacc59d3753046f948fbedd13b0a2aaab2e4068e91b8bdf53c6e086c
-
Filesize
127B
MD521223e9184445fe043476484cd8cb1f9
SHA12b4813f849121d60ba35eb0889080668bb62c778
SHA256bb61b7c087c2ae2de93a7740ff75707342940557146366e92b840284cd9446af
SHA512be21408de0cc643650e5d9ab9057a8f9de88e37fbdc6417cfeba160402ec4cd14fccbc82cbbfd941ecfc0bb3d4056ee61ac199efdc99d647d53e65818835fd48
-
Filesize
136B
MD565725641cce557eafbb5ef060ee1dafe
SHA1fabbaf0f442aeeb6bf3aede22ebc271fb0e7b50b
SHA256db802a8c14576f939a8e0b10f0e645e87c70c7b0d6ace6bccc857e7d50cbe760
SHA51235edb38cd43502987de12bbaf6a99f95fc14fee6acc73edd43252125b096c05b07638a68c4b4120c39806c82c2dc2b251143a9ac156905945ee8ecdae393dd7e