General

  • Target

    ab423568ddf61f5d4a063bfddd41ff2b02f635566d836148d775aaca9c9b02ca

  • Size

    4.6MB

  • Sample

    231220-nmvzeahae6

  • MD5

    c7848f11540ed0b558fbb1da4eba476a

  • SHA1

    30afa2d6c6e1971309532b8800c325aed12c3e83

  • SHA256

    ab423568ddf61f5d4a063bfddd41ff2b02f635566d836148d775aaca9c9b02ca

  • SHA512

    ae54de70da8f2ee59b7d11fc4023bd9853202036836f6f736b0e4ea2763e4f26f7820bf045d26daae8eadd147e549e0093f67ca6e5b2763bebfca52c01ec1e68

  • SSDEEP

    98304:g56BdShdRyHKQ+i23wGLA4c8GgveNghl5sXO3IlOAJ0H4GI8HE9IrmVv1z:AKdShuki2A9p0l5UAIlOs0H2VIA

Malware Config

Extracted

Family

ermac

C2

http://194.26.29.28:3434

AES_key
AES_key

Targets

    • Target

      ab423568ddf61f5d4a063bfddd41ff2b02f635566d836148d775aaca9c9b02ca

    • Size

      4.6MB

    • MD5

      c7848f11540ed0b558fbb1da4eba476a

    • SHA1

      30afa2d6c6e1971309532b8800c325aed12c3e83

    • SHA256

      ab423568ddf61f5d4a063bfddd41ff2b02f635566d836148d775aaca9c9b02ca

    • SHA512

      ae54de70da8f2ee59b7d11fc4023bd9853202036836f6f736b0e4ea2763e4f26f7820bf045d26daae8eadd147e549e0093f67ca6e5b2763bebfca52c01ec1e68

    • SSDEEP

      98304:g56BdShdRyHKQ+i23wGLA4c8GgveNghl5sXO3IlOAJ0H4GI8HE9IrmVv1z:AKdShuki2A9p0l5UAIlOs0H2VIA

    • Ermac

      An Android banking trojan first seen in July 2021.

    • Ermac2 payload

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks