General

  • Target

    fd14a6c67eab31cad7c270ea798919eb3147828f6d256d7df3d9623b77be6676.bin

  • Size

    1.3MB

  • Sample

    230808-13xjdshf3w

  • MD5

    210386cdeed7e4405152769a15286b72

  • SHA1

    e1f3ec7462f9766ae5621115e5e5bc8a886b8b19

  • SHA256

    fd14a6c67eab31cad7c270ea798919eb3147828f6d256d7df3d9623b77be6676

  • SHA512

    6dacf6e1efee56c9686bdb707ac11dddd2da4a8e4b53c8917859bf5ae9112f133193f143d0199e3100ac07506c3cba26ec9f92dd8d31e4cc6d18071dbc783a8d

  • SSDEEP

    24576:errfbjf+zwTO/ShvVmcV3JWk0PZUW9vVBypw7eTgShWl:krf/qSJFAkfWvO5TgSw

Malware Config

Extracted

Family

ermac

AES_key

Targets

    • Target

      fd14a6c67eab31cad7c270ea798919eb3147828f6d256d7df3d9623b77be6676.bin

    • Size

      1.3MB

    • MD5

      210386cdeed7e4405152769a15286b72

    • SHA1

      e1f3ec7462f9766ae5621115e5e5bc8a886b8b19

    • SHA256

      fd14a6c67eab31cad7c270ea798919eb3147828f6d256d7df3d9623b77be6676

    • SHA512

      6dacf6e1efee56c9686bdb707ac11dddd2da4a8e4b53c8917859bf5ae9112f133193f143d0199e3100ac07506c3cba26ec9f92dd8d31e4cc6d18071dbc783a8d

    • SSDEEP

      24576:errfbjf+zwTO/ShvVmcV3JWk0PZUW9vVBypw7eTgShWl:krf/qSJFAkfWvO5TgSw

    • Ermac

      An Android banking trojan first seen in July 2021.

    • Ermac2 payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks