Malware Analysis Report

2024-10-19 13:02

Sample ID 230828-1wv2zsgc47
Target a4f4d78002d9d0a3ee58124f03c945f66a151a52d7b9357665c319ba9572ef7a.bin
SHA256 a4f4d78002d9d0a3ee58124f03c945f66a151a52d7b9357665c319ba9572ef7a
Tags
ermac hook banker infostealer rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

a4f4d78002d9d0a3ee58124f03c945f66a151a52d7b9357665c319ba9572ef7a

Threat Level: Known bad

The file a4f4d78002d9d0a3ee58124f03c945f66a151a52d7b9357665c319ba9572ef7a.bin was found to be: Known bad.

Malicious Activity Summary

ermac hook banker infostealer rat trojan

Ermac

Ermac2 payload

Hook

Requests dangerous framework permissions

Loads dropped Dex/Jar

Enumerates running processes

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-08-28 22:00

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows read access to the device's phone number(s). android.permission.READ_PHONE_NUMBERS N/A N/A
Allows an application to read the user's call log. android.permission.READ_CALL_LOG N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to write the user's contacts data. android.permission.WRITE_CONTACTS N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-08-28 22:00

Reported

2023-08-28 22:03

Platform

android-x86-arm-20230824-en

Max time kernel

1042938s

Max time network

130s

Command Line

com.yutexagodoceyome.juve

Signatures

Ermac

banker trojan infostealer ermac

Ermac2 payload

Description Indicator Process Target
N/A N/A N/A N/A

Hook

rat trojan infostealer hook

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.yutexagodoceyome.juve/app_payload_lib/com_yutexagodoceyome_juve_empty_classes/RTKV58DTBNQ6FTLE0VO50GCT0XN2SEH.zip N/A N/A
N/A /data/user/0/com.yutexagodoceyome.juve/app_payload_lib/com_yutexagodoceyome_juve_empty_classes/RTKV58DTBNQ6FTLE0VO50GCT0XN2SEH.zip N/A N/A
N/A Anonymous-DexFile@0xcce42000-0xccf7aa84 N/A N/A

Enumerates running processes

Processes

com.yutexagodoceyome.juve

sh -c getprop ro.dalvik.vm.isa.arm

getprop ro.dalvik.vm.isa.arm

sh -c getprop ro.dalvik.vm.isa.arm64

getprop ro.dalvik.vm.isa.arm64

/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.yutexagodoceyome.juve/app_payload_lib/com_yutexagodoceyome_juve_empty_classes/RTKV58DTBNQ6FTLE0VO50GCT0XN2SEH.zip --output-vdex-fd=53 --oat-fd=55 --oat-location=/data/user/0/com.yutexagodoceyome.juve/app_payload_lib/com_yutexagodoceyome_juve_empty_classes/oat/x86/RTKV58DTBNQ6FTLE0VO50GCT0XN2SEH.odex --compiler-filter=quicken --class-loader-context=&

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 infinitedata-pa.googleapis.com udp
NL 142.251.36.14:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
NL 142.250.179.206:443 android.apis.google.com tcp
NL 142.250.179.202:443 infinitedata-pa.googleapis.com tcp

Files

/data/user/0/com.yutexagodoceyome.juve/app_payload_lib/com_yutexagodoceyome_juve_empty_classes/RTKV58DTBNQ6FTLE0VO50GCT0XN2SEH.zip

MD5 9386474dc469af23143b05cd92a19122
SHA1 4334733a1046ec9ea07c319e19a3646d6d9ed2b2
SHA256 b3f1fcae8af69fdd0a75fe2b28ebe22be963085f2cd5131350f0676eb5dc9934
SHA512 67652165d1b99b32f88ec92dec2f3a0e0e61d6a00e4e92c30a0b3efe491afb82165e859846e18e609f47cdad1f8baa90b7b4a17feb15edf05f862a6cf8d09fe4

/data/user/0/com.yutexagodoceyome.juve/app_payload_lib/com_yutexagodoceyome_juve_empty_classes/RTKV58DTBNQ6FTLE0VO50GCT0XN2SEH.zip

MD5 9386474dc469af23143b05cd92a19122
SHA1 4334733a1046ec9ea07c319e19a3646d6d9ed2b2
SHA256 b3f1fcae8af69fdd0a75fe2b28ebe22be963085f2cd5131350f0676eb5dc9934
SHA512 67652165d1b99b32f88ec92dec2f3a0e0e61d6a00e4e92c30a0b3efe491afb82165e859846e18e609f47cdad1f8baa90b7b4a17feb15edf05f862a6cf8d09fe4

Anonymous-DexFile@0xcce42000-0xccf7aa84

MD5 377626c359ad14ca861f2594e2400781
SHA1 8c1edc5d5df24b952a3bbfab34e6d2dd2bc45a0e
SHA256 91a4c278df977bce144dc5ed9ed2745011e4e01c1b55666df8906a759a9539ce
SHA512 ce7926ffe8b8b02642fef3dd973c909a17306008127584f1d78131d2400b5f21cdd3e3150ce619aa08003b140ac96ef894a036d2047ff936a6b1057418b9e978