General

  • Target

    26fecbc88045e70e234883e10fc38bdd7ea20a35f7a69581d96c8f5ca112a73c.bin

  • Size

    1.3MB

  • Sample

    231111-1xerdsbg7t

  • MD5

    7ac11849e56e4060a3c34546820fc986

  • SHA1

    bbdba4c3995d3578057d04fdd4cd2f30e7b6304d

  • SHA256

    26fecbc88045e70e234883e10fc38bdd7ea20a35f7a69581d96c8f5ca112a73c

  • SHA512

    58d42a097506be8d98603941a571f4fa44d87853a92fd3f6a213f996a5b14b44788204de5caefb097247a19dcfdbf5a1dae108b4858661b15395b6e6aac9e3a5

  • SSDEEP

    24576:M4O7mlm5gSyluKhE3SB6H/sNkIgpaYesIhAjD9RGiD:M4O7mo5gS2uKhE3SBk8kJeJm

Malware Config

Extracted

Family

ermac

C2

http://85.209.176.47:3434

AES_key

Extracted

Family

hook

C2

http://85.209.176.47:3434

AES_key

Targets

    • Target

      26fecbc88045e70e234883e10fc38bdd7ea20a35f7a69581d96c8f5ca112a73c.bin

    • Size

      1.3MB

    • MD5

      7ac11849e56e4060a3c34546820fc986

    • SHA1

      bbdba4c3995d3578057d04fdd4cd2f30e7b6304d

    • SHA256

      26fecbc88045e70e234883e10fc38bdd7ea20a35f7a69581d96c8f5ca112a73c

    • SHA512

      58d42a097506be8d98603941a571f4fa44d87853a92fd3f6a213f996a5b14b44788204de5caefb097247a19dcfdbf5a1dae108b4858661b15395b6e6aac9e3a5

    • SSDEEP

      24576:M4O7mlm5gSyluKhE3SB6H/sNkIgpaYesIhAjD9RGiD:M4O7mo5gS2uKhE3SBk8kJeJm

    • Ermac

      An Android banking trojan first seen in July 2021.

    • Ermac2 payload

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Makes use of the framework's Accessibility service.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks