General

  • Target

    0ec3aba023da64c28c3e664ba83a337782c855f3b39874cde59fe8f60b93573a.apk

  • Size

    4.6MB

  • Sample

    230506-23pdfsha6t

  • MD5

    1c74d4eeebdbd04e6f9524f63b15b84d

  • SHA1

    5d86aefe2e6632572b971338a5556ee8a9fc96c9

  • SHA256

    0ec3aba023da64c28c3e664ba83a337782c855f3b39874cde59fe8f60b93573a

  • SHA512

    866761e39296f3399a8b0af6209a644a1a54e0a5519130acf0fafc82e11ec36de83c7d4b7d38f4c4606dcae0a0c745d5f2896e8109d4d5c768ecdd04cd0c4852

  • SSDEEP

    98304:k4HuqlDao42RLqaw/jTLq36t+FpyhRTcKm6eAdjTvQlye2tuT/gUMlgm:zHZ2oZ+tm4+fyTTc+JTvy0tK/L+gm

Malware Config

Extracted

Family

ermac

C2

http://194.26.29.28:3434

AES_key
AES_key

Targets

    • Target

      0ec3aba023da64c28c3e664ba83a337782c855f3b39874cde59fe8f60b93573a.apk

    • Size

      4.6MB

    • MD5

      1c74d4eeebdbd04e6f9524f63b15b84d

    • SHA1

      5d86aefe2e6632572b971338a5556ee8a9fc96c9

    • SHA256

      0ec3aba023da64c28c3e664ba83a337782c855f3b39874cde59fe8f60b93573a

    • SHA512

      866761e39296f3399a8b0af6209a644a1a54e0a5519130acf0fafc82e11ec36de83c7d4b7d38f4c4606dcae0a0c745d5f2896e8109d4d5c768ecdd04cd0c4852

    • SSDEEP

      98304:k4HuqlDao42RLqaw/jTLq36t+FpyhRTcKm6eAdjTvQlye2tuT/gUMlgm:zHZ2oZ+tm4+fyTTc+JTvy0tK/L+gm

    • Ermac

      An Android banking trojan first seen in July 2021.

    • Ermac2 payload

    • Makes use of the framework's Accessibility service.

    • Removes its main activity from the application launcher

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the unique device ID (IMEI, MEID, IMSI).

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks