Malware Analysis Report

2024-10-19 13:02

Sample ID 230829-aeyhnsbh2w
Target a4f4d78002d9d0a3ee58124f03c945f66a151a52d7b9357665c319ba9572ef7a.bin
SHA256 a4f4d78002d9d0a3ee58124f03c945f66a151a52d7b9357665c319ba9572ef7a
Tags
ermac hook banker infostealer rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

a4f4d78002d9d0a3ee58124f03c945f66a151a52d7b9357665c319ba9572ef7a

Threat Level: Known bad

The file a4f4d78002d9d0a3ee58124f03c945f66a151a52d7b9357665c319ba9572ef7a.bin was found to be: Known bad.

Malicious Activity Summary

ermac hook banker infostealer rat trojan

Ermac

Ermac2 payload

Hook

Requests dangerous framework permissions

Loads dropped Dex/Jar

Enumerates running processes

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-08-29 00:08

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows read access to the device's phone number(s). android.permission.READ_PHONE_NUMBERS N/A N/A
Allows an application to read the user's call log. android.permission.READ_CALL_LOG N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to write the user's contacts data. android.permission.WRITE_CONTACTS N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-08-29 00:08

Reported

2023-08-29 00:08

Platform

android-x64-20230824-en

Max time network

7s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
DE 172.217.23.194:443 tcp
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 android.apis.google.com udp
US 1.1.1.1:53 android.apis.google.com udp

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2023-08-29 00:08

Reported

2023-08-29 00:13

Platform

android-x64-arm64-20230824-en

Max time kernel

1050609s

Max time network

310s

Command Line

com.yutexagodoceyome.juve

Signatures

N/A

Processes

com.yutexagodoceyome.juve

Network

Country Destination Domain Proto
NL 142.251.39.110:443 tcp
NL 142.251.39.110:443 tcp
NL 142.251.39.110:443 tcp
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 infinitedata-pa.googleapis.com udp
NL 142.250.179.170:443 infinitedata-pa.googleapis.com tcp
NL 142.251.39.106:443 infinitedata-pa.googleapis.com tcp
NL 142.251.39.106:443 infinitedata-pa.googleapis.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
US 1.1.1.1:53 ssl.google-analytics.com udp
US 1.1.1.1:53 infinitedata-pa.googleapis.com udp
US 1.1.1.1:53 ssl.google-analytics.com udp
NL 142.250.179.200:443 ssl.google-analytics.com tcp
DE 172.217.23.194:443 tcp

Files

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2023-08-29 00:08

Reported

2023-08-29 00:13

Platform

android-x86-arm-20230824-en

Max time kernel

1050606s

Max time network

306s

Command Line

com.yutexagodoceyome.juve

Signatures

Ermac

banker trojan infostealer ermac

Ermac2 payload

Description Indicator Process Target
N/A N/A N/A N/A

Hook

rat trojan infostealer hook

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.yutexagodoceyome.juve/app_payload_lib/com_yutexagodoceyome_juve_empty_classes/7OCSQ2J2WBLJ93VXLOQOJHFTW1CG4TW.zip N/A N/A
N/A /data/user/0/com.yutexagodoceyome.juve/app_payload_lib/com_yutexagodoceyome_juve_empty_classes/7OCSQ2J2WBLJ93VXLOQOJHFTW1CG4TW.zip N/A N/A
N/A Anonymous-DexFile@0xd2943000-0xd2a7ba84 N/A N/A

Enumerates running processes

Processes

com.yutexagodoceyome.juve

sh -c getprop ro.dalvik.vm.isa.arm

getprop ro.dalvik.vm.isa.arm

sh -c getprop ro.dalvik.vm.isa.arm64

getprop ro.dalvik.vm.isa.arm64

/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.yutexagodoceyome.juve/app_payload_lib/com_yutexagodoceyome_juve_empty_classes/7OCSQ2J2WBLJ93VXLOQOJHFTW1CG4TW.zip --output-vdex-fd=51 --oat-fd=54 --oat-location=/data/user/0/com.yutexagodoceyome.juve/app_payload_lib/com_yutexagodoceyome_juve_empty_classes/oat/x86/7OCSQ2J2WBLJ93VXLOQOJHFTW1CG4TW.odex --compiler-filter=quicken --class-loader-context=&

sh -c getprop ro.dalvik.vm.isa.arm64

getprop ro.dalvik.vm.isa.arm64

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 infinitedata-pa.googleapis.com udp
GB 216.58.208.106:443 infinitedata-pa.googleapis.com tcp
US 1.1.1.1:53 android.apis.google.com udp
NL 142.250.179.206:443 android.apis.google.com tcp
NL 142.250.179.130:443 tcp
NL 142.250.179.142:443 tcp
NL 142.251.39.99:443 tcp
NL 142.251.39.99:443 tcp
NL 142.251.36.14:443 tcp
NL 142.251.39.99:443 tcp
NL 142.251.36.14:443 tcp
NL 142.251.39.99:443 tcp
US 1.1.1.1:53 safebrowsing.googleapis.com udp
NL 172.217.168.234:443 safebrowsing.googleapis.com tcp
NL 142.250.179.206:443 android.apis.google.com tcp
US 1.1.1.1:53 pcrrcyivfodqq udp
US 1.1.1.1:53 kdhcswwimzdyehq udp
US 1.1.1.1:53 aveuyozmc udp
US 1.1.1.1:53 sqs.ap-northeast-1.amazonaws.com udp
JP 18.183.37.31:443 sqs.ap-northeast-1.amazonaws.com tcp
US 1.1.1.1:53 null udp
JP 18.183.37.31:443 sqs.ap-northeast-1.amazonaws.com tcp
JP 18.183.37.31:443 sqs.ap-northeast-1.amazonaws.com tcp
BG 94.156.253.67:3434 94.156.253.67 tcp
BG 94.156.253.67:3434 94.156.253.67 tcp
BG 94.156.253.67:3434 94.156.253.67 tcp
BG 94.156.253.67:3434 94.156.253.67 tcp
BG 94.156.253.67:3434 94.156.253.67 tcp
BG 94.156.253.67:3434 94.156.253.67 tcp
BG 94.156.253.67:3434 94.156.253.67 tcp
GB 216.58.208.99:80 tcp

Files

/data/user/0/com.yutexagodoceyome.juve/app_payload_lib/com_yutexagodoceyome_juve_empty_classes/7OCSQ2J2WBLJ93VXLOQOJHFTW1CG4TW.zip

MD5 9386474dc469af23143b05cd92a19122
SHA1 4334733a1046ec9ea07c319e19a3646d6d9ed2b2
SHA256 b3f1fcae8af69fdd0a75fe2b28ebe22be963085f2cd5131350f0676eb5dc9934
SHA512 67652165d1b99b32f88ec92dec2f3a0e0e61d6a00e4e92c30a0b3efe491afb82165e859846e18e609f47cdad1f8baa90b7b4a17feb15edf05f862a6cf8d09fe4

/data/user/0/com.yutexagodoceyome.juve/app_payload_lib/com_yutexagodoceyome_juve_empty_classes/7OCSQ2J2WBLJ93VXLOQOJHFTW1CG4TW.zip

MD5 9386474dc469af23143b05cd92a19122
SHA1 4334733a1046ec9ea07c319e19a3646d6d9ed2b2
SHA256 b3f1fcae8af69fdd0a75fe2b28ebe22be963085f2cd5131350f0676eb5dc9934
SHA512 67652165d1b99b32f88ec92dec2f3a0e0e61d6a00e4e92c30a0b3efe491afb82165e859846e18e609f47cdad1f8baa90b7b4a17feb15edf05f862a6cf8d09fe4

Anonymous-DexFile@0xd2943000-0xd2a7ba84

MD5 377626c359ad14ca861f2594e2400781
SHA1 8c1edc5d5df24b952a3bbfab34e6d2dd2bc45a0e
SHA256 91a4c278df977bce144dc5ed9ed2745011e4e01c1b55666df8906a759a9539ce
SHA512 ce7926ffe8b8b02642fef3dd973c909a17306008127584f1d78131d2400b5f21cdd3e3150ce619aa08003b140ac96ef894a036d2047ff936a6b1057418b9e978