Analysis
-
max time kernel
3056430s -
max time network
155s -
platform
android_x86 -
resource
android-x86-arm-20231023-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20231023-enlocale:en-usos:android-9-x86system -
submitted
09-11-2023 22:05
Static task
static1
Behavioral task
behavioral1
Sample
bb0af025c7d8c9b5245c913c9b037633ec19f173bbb1b7800331a16e05eb5e86.apk
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral2
Sample
bb0af025c7d8c9b5245c913c9b037633ec19f173bbb1b7800331a16e05eb5e86.apk
Resource
android-x64-20231023.1-en
Behavioral task
behavioral3
Sample
bb0af025c7d8c9b5245c913c9b037633ec19f173bbb1b7800331a16e05eb5e86.apk
Resource
android-x64-arm64-20231023-en
General
-
Target
bb0af025c7d8c9b5245c913c9b037633ec19f173bbb1b7800331a16e05eb5e86.apk
-
Size
1.5MB
-
MD5
ebf124b4b3abec5f671c787169fd6985
-
SHA1
ea36903b6fb393b140c7019a44510f0603cccf94
-
SHA256
bb0af025c7d8c9b5245c913c9b037633ec19f173bbb1b7800331a16e05eb5e86
-
SHA512
1e505acf2c544f8466e9ec5ad9643e0e976acaf097398ff94e016584829222b0bcc1d3bba911def843c75e4369af8e03351e0f04f8f64bace7a523f8078b30a6
-
SSDEEP
24576:2K/v23xqjeG+54+eS/j1wGkwSQV6jZe54fwyMIue7k6gggSBzf:tW30jd+54+lmZU6F+diVgggSFf
Malware Config
Extracted
ermac
http://85.209.176.47:3434
Extracted
hook
http://85.209.176.47:3434
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac2 payload 4 IoCs
resource yara_rule behavioral1/files/fstream-2.dat family_ermac2 behavioral1/memory/4288-0.dex family_ermac2 behavioral1/memory/4318-0.dex family_ermac2 behavioral1/memory/4288-1.dex family_ermac2 -
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps). 1 IoCs
description ioc Process Framework service call android.content.pm.IPackageManager.getInstalledApplications com.jorasawerakumoga.ludalo -
Acquires the wake lock. 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.jorasawerakumoga.ludalo -
Loads dropped Dex/Jar 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.jorasawerakumoga.ludalo/app_g977.gi0.drx0.oix/newobfs/0.pobfs 4288 com.jorasawerakumoga.ludalo /data/user/0/com.jorasawerakumoga.ludalo/app_g977.gi0.drx0.oix/newobfs/0.pobfs 4318 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.jorasawerakumoga.ludalo/app_g977.gi0.drx0.oix/newobfs/0.pobfs --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.jorasawerakumoga.ludalo/app_g977.gi0.drx0.oix/newobfs/oat/x86/0.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.jorasawerakumoga.ludalo/app_g977.gi0.drx0.oix/newobfs/0.pobfs 4288 com.jorasawerakumoga.ludalo -
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.jorasawerakumoga.ludalo
Processes
-
com.jorasawerakumoga.ludalo1⤵
- Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
- Acquires the wake lock.
- Loads dropped Dex/Jar
- Uses Crypto APIs (Might try to encrypt user data).
PID:4288 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.jorasawerakumoga.ludalo/app_g977.gi0.drx0.oix/newobfs/0.pobfs --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.jorasawerakumoga.ludalo/app_g977.gi0.drx0.oix/newobfs/oat/x86/0.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4318
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5184e6ff93c17d7c7e6d8add06e7b3e81
SHA16676a9aabe29c00b1b87207445237e9b0cc01ff9
SHA2565e7ced6c4ad78b01040ee911c237c9c32c4628c200a5847b7a833c81280ddcb9
SHA512f86fba96bb92d6a81ab627e46df2ac542d04d5f53ac300cd2008069c5fc886991d54977ac1ee9ba2ee55c14f69ac013a7f25b2cc869fd7ac120b8c1b9b843394
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5537a0c039e700fd8f3a201b252d4565d
SHA1a350c3d02aeac6f9a411a43a4150abc6848ec9df
SHA256224dd4b1259b6ef0c25ea4717a38e330b81cd08fac01255ee5d8b00d90c9a199
SHA512f84240a76d1b8b981f9bce10981d3c895821c48b3567580cef944dabd7ba9aa606f3568f812912d1615e699764b7ddf383208bf7ef3ff83cdbd31cff319287f3
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
108KB
MD5955a3e80fe820cc4e9743b77144c4adf
SHA144ae979ea242477624a0ee470e1e21008c444763
SHA2564c128f20a0cac501cfc886c179a785863a7426e707bab2bebfb8545575adde37
SHA512318000244ff4fd5894ee6ef58ed82f56414f869251e69ff6df6ea1299e9c35878b4dd94b7fd77902b634675724f1ecf0cb858efd1de4073438269c52715df07c
-
Filesize
173KB
MD580cae1b034f25ccf7ff0e46140d88bb8
SHA1cc9132833046b1cfd8e8b963c8b95f1263fd2e35
SHA2560b7a40b8980359929d07a3e625243c18810c784f5e0557c56cefc1635ea26bc8
SHA512ec056bf1e731bf35b1b7d0de68dda969eded85514b238351fdacd838d5f68dbb840828fdb09406f8c356b862ebf65f1cf370e577ff5a587b590e0e3e990f5864
-
Filesize
16KB
MD505969cc4b00ee0f78fab3c1d5a631ea5
SHA1c8ab18783a07097ca202f706d232f0a5dbd10039
SHA256d88ab07b048e9b5b98f576907aefc9577e4c5628d14a1d6f32899a90b2ca61fd
SHA512ae5017a77f9102321289a206277814b9e0e6ec1feba92fc4b1d8815cbc52bd416a2bafb3ae65f8a1b1d29167547616a40a5e3e05d3d69bdb45f75633564fdb41
-
Filesize
1.6MB
MD5184e6ff93c17d7c7e6d8add06e7b3e81
SHA16676a9aabe29c00b1b87207445237e9b0cc01ff9
SHA2565e7ced6c4ad78b01040ee911c237c9c32c4628c200a5847b7a833c81280ddcb9
SHA512f86fba96bb92d6a81ab627e46df2ac542d04d5f53ac300cd2008069c5fc886991d54977ac1ee9ba2ee55c14f69ac013a7f25b2cc869fd7ac120b8c1b9b843394
-
Filesize
1.6MB
MD54499d44d2a4a75e0318bbb2311040012
SHA188078ed042f3c8341b18b9777ec469612e90c71d
SHA256b3574816774839af0e306edc9fe0cc6a1121a13bff4b9ec1175258bfe70e2c41
SHA512caad9c6aaeb615835d1364299dfb8b328dc537ec2ababa23a0a94fc4316bd7b0d71da5a204d29a912d251080e683aa3e2e1aef11c22e5691e5372575f98b8b5c
-
Filesize
1.6MB
MD5184e6ff93c17d7c7e6d8add06e7b3e81
SHA16676a9aabe29c00b1b87207445237e9b0cc01ff9
SHA2565e7ced6c4ad78b01040ee911c237c9c32c4628c200a5847b7a833c81280ddcb9
SHA512f86fba96bb92d6a81ab627e46df2ac542d04d5f53ac300cd2008069c5fc886991d54977ac1ee9ba2ee55c14f69ac013a7f25b2cc869fd7ac120b8c1b9b843394