General

  • Target

    739d83c8ca63e674d56bc4c6024eac790d66d460c27437f47009fed834d47feb

  • Size

    2.2MB

  • Sample

    231220-amds8sbefk

  • MD5

    366134f007de0bede5afb773774c4064

  • SHA1

    62bec235f1067baf34a0d0b93dfb63e554e65071

  • SHA256

    739d83c8ca63e674d56bc4c6024eac790d66d460c27437f47009fed834d47feb

  • SHA512

    11b8f919c2a2b92d3e8d48a4f586bf5c13123e976bb4980372f80d57bf43b65e8fdd04e69f4cd1c3a293da58c69cc7d4a0fcc4b4cdb5fa4f521f54a0011caa1a

  • SSDEEP

    49152:exu1Da69wU3VYuxhVCrvSU4fqrHvQBTR1oGiMl0:0uDauwUFYWh/UbvQBPoh1

Malware Config

Extracted

Family

ermac

C2

http://193.106.191.118:3434

AES_key
AES_key

Targets

    • Target

      739d83c8ca63e674d56bc4c6024eac790d66d460c27437f47009fed834d47feb

    • Size

      2.2MB

    • MD5

      366134f007de0bede5afb773774c4064

    • SHA1

      62bec235f1067baf34a0d0b93dfb63e554e65071

    • SHA256

      739d83c8ca63e674d56bc4c6024eac790d66d460c27437f47009fed834d47feb

    • SHA512

      11b8f919c2a2b92d3e8d48a4f586bf5c13123e976bb4980372f80d57bf43b65e8fdd04e69f4cd1c3a293da58c69cc7d4a0fcc4b4cdb5fa4f521f54a0011caa1a

    • SSDEEP

      49152:exu1Da69wU3VYuxhVCrvSU4fqrHvQBTR1oGiMl0:0uDauwUFYWh/UbvQBPoh1

    • Ermac

      An Android banking trojan first seen in July 2021.

    • Ermac2 payload

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks