Analysis
-
max time kernel
4091671s -
max time network
130s -
platform
android_x64 -
resource
android-x64-20220823-en -
resource tags
androidarch:x64arch:x86image:android-x64-20220823-enlocale:en-usos:android-10-x64system -
submitted
06/05/2023, 23:06
Static task
static1
Behavioral task
behavioral1
Sample
0ec3aba023da64c28c3e664ba83a337782c855f3b39874cde59fe8f60b93573a.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
0ec3aba023da64c28c3e664ba83a337782c855f3b39874cde59fe8f60b93573a.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
0ec3aba023da64c28c3e664ba83a337782c855f3b39874cde59fe8f60b93573a.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
0ec3aba023da64c28c3e664ba83a337782c855f3b39874cde59fe8f60b93573a.apk
-
Size
4.6MB
-
MD5
1c74d4eeebdbd04e6f9524f63b15b84d
-
SHA1
5d86aefe2e6632572b971338a5556ee8a9fc96c9
-
SHA256
0ec3aba023da64c28c3e664ba83a337782c855f3b39874cde59fe8f60b93573a
-
SHA512
866761e39296f3399a8b0af6209a644a1a54e0a5519130acf0fafc82e11ec36de83c7d4b7d38f4c4606dcae0a0c745d5f2896e8109d4d5c768ecdd04cd0c4852
-
SSDEEP
98304:k4HuqlDao42RLqaw/jTLq36t+FpyhRTcKm6eAdjTvQlye2tuT/gUMlgm:zHZ2oZ+tm4+fyTTc+JTvy0tK/L+gm
Malware Config
Extracted
ermac
http://194.26.29.28:3434
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac2 payload 1 IoCs
resource yara_rule behavioral2/memory/4799-0.dex family_ermac2 -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.qjlpfydjb.bpycogkzm/egfU8goe8U/8yUk8fjykG87ekU/base.apk.kI9Ugey1.i8w 4799 com.qjlpfydjb.bpycogkzm -
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.qjlpfydjb.bpycogkzm
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48B
MD56d7d499960179766cd4261d12dacc411
SHA1e6f8553b0015e12b23cc551afe98763f3b1c9bed
SHA256c96ac03cfdbc6f4c1bdcdf764f1a6573f852e7aae5ef405969516b93ed271182
SHA5126526c668477a01a850b8757b77dd3e7be27ad1991f5cf777685efcb03a21f31b71f6eae00f326931599baae4b16360e33e3d0f2894f1b2c1753391df02a14547
-
Filesize
96B
MD50960892e658b537fb35e78a82e9fab86
SHA1a51d0f00c9044281445ea2a55f94d573ef75c4c5
SHA256d972cab63ef7012194065eb61c2e191ad0f931b2a24c75683173d3d16afeb704
SHA512320fd92e4c98262f7824f13341ee84e6e222d88963d0a40e9b4500dd4f2729688cacef2f44587043f2b160c4d2c7eb8d76af40dda19d36bfc542c9092c3fd9b1
-
Filesize
112KB
MD5b663831f8cc130493476d94f2d7a5330
SHA1043a1956ab8e40821d67043f8a9110a8eb36fb93
SHA256c109aa8bfc364d5fd0756f1c9d35ee3d6df31325061ac70d8469f28cfc882ab7
SHA512e8ee923192cdf16318febdc23362f3eeaf5c914b923f80cd3a91a2e83e94bced54460d4ef1e54accc26a7d54b89e2e10c00097e60002cf6427298dc5f18fed16
-
Filesize
1KB
MD525224dded6a6cb918ebf1072eaba0210
SHA1797b060a60704c0ec3d5a8312bf13f03f383ee43
SHA2565a6cc667db55e7ef893f134f405fb6f601b54133ac9aa713d6730c7e3f3ee20b
SHA51272d8d2d1463b6bdb19db35c1ce6f07278e5da9e579eefeb4ef8019d864c80d5947d343489530ccc2889acf532f6ddbb7c9daf4972ed1760bd1cc1fc99f192c96
-
Filesize
36B
MD53275dbab54df427bff9a86d77b757cbb
SHA112483e28bfc426807f3283daabb4426bc8b4319f
SHA2562fd443ccf1279b97255c4e3b65d5db2aee3dc2c2722cd0b4bb848ad34600bd92
SHA512b5317a529124a1457d40f08b9f3b87166926330b0a56984f4e66136e9d550ed5f0db28bc35564b98474a513bda15b2868556ee4a62aef93cdf5d544bb94b3e8c
-
Filesize
40B
MD54611d6b0a2cc24d70cd5e385b8495fae
SHA13e82fea8dc641e9d900442b05f555904ce0eb5ba
SHA2563d9cf1336780987408b8d658ab4472c6f3a43d37d360e0af47133ca669cce8e7
SHA512d6251c1de8dbee832b029fed2d600ee09abed1688fcd5237abe9c0a0557edfffdbab49ca82bb9e9a4bc151646ade16063dee4e40d545810a703c64b910d283f9
-
Filesize
48B
MD56d7d499960179766cd4261d12dacc411
SHA1e6f8553b0015e12b23cc551afe98763f3b1c9bed
SHA256c96ac03cfdbc6f4c1bdcdf764f1a6573f852e7aae5ef405969516b93ed271182
SHA5126526c668477a01a850b8757b77dd3e7be27ad1991f5cf777685efcb03a21f31b71f6eae00f326931599baae4b16360e33e3d0f2894f1b2c1753391df02a14547
-
/data/user/0/com.qjlpfydjb.bpycogkzm/cache/org.chromium.android_webview/Code Cache/js/index-dir/temp-index
Filesize96B
MD5c43a228bb8901a648fe30177fa2709cf
SHA130e26ba05456cc5ed658b1148f8d04c9675735f6
SHA2569bd907612b7f88cc86451c460118f1b15f0da144e18fe3b3c7e72e00beeddf5f
SHA512853abfbfff09b2989a36eb3cc0c615e5770a3393ca00d1dc18e3ee83a3bb08acc5624210fe9730344cc552c6f776d19fe7f33c2e6481e018d77f7c5bd466e18a
-
Filesize
1.4MB
MD5b6743ab0c201878d1af5f0343ebe8fc6
SHA101300063b5906c950eff077f3ce980ecefa048e9
SHA25636d11490991e9ec4ca3697e80b83ecca02d4457b71c5586531298766cf7ba8a3
SHA5124f2801d8ca40def3013175fd08ad1a7cb6bd354397c3bcf0aeba01abb11d6189673c06f82e1808e7415ef55018120e31574e9e419baaca71f18e84e6db51a3c8
-
Filesize
127B
MD56ef709b8536878951e87c29a1518fc2b
SHA124376c70b00152501b3d98df61fa7db435339172
SHA25610b13d894f36d4391fcc31313a244d5f6cd89c8e8c03347282e281c4af13c0a6
SHA51296547eff6779251a5c4941e812ec56ed273e9270265005723e1f2864688b04f3b852a90145fba4ea0ddf1e02b39d99e33d28f761b07a04d46e0e4257d8909ff9
-
Filesize
306B
MD5bc101bf6f052b3c4508112e3dd6a8b3f
SHA1944df04a88615b27dfce481fb86a95691dfccb99
SHA256d55182cdcd7b992055441311856672d8709b916707fe64887a7eba9044d14879
SHA512b540a8ebf682bcbfb78cef207543089b063b95457be6e6ba1e6ff9a8451da64a11746011bb3f79d26ed505ee5e827333d280acd4d183e8f076ef58459de9caba
-
Filesize
136B
MD56cfa8b67e515d52630433d8c10ab2384
SHA1c872b36e27c8898c3987cc06593d429ea078725f
SHA256679a557dcf4e6a85f851d92a1f6e5f3c9244c1169ae24f99086da95c69b50cd9
SHA512f46eb8374ba84246a226e96069967fc8dc035530b1b7ad192894fc82389dd572461ec85bf4f09d945422267b53bc9fa7d7f35cf99b604e6fe057e92339bba83b