Analysis
-
max time kernel
341391s -
max time network
153s -
platform
android_x86 -
resource
android-x86-arm-20231215-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20231215-enlocale:en-usos:android-9-x86system -
submitted
16-01-2024 22:02
Behavioral task
behavioral1
Sample
d5be61f974234f7ee6e4eaa21072a45c77f9d5742101842b58bf3381033154f5.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
d5be61f974234f7ee6e4eaa21072a45c77f9d5742101842b58bf3381033154f5.apk
Resource
android-x64-20231215-en
General
-
Target
d5be61f974234f7ee6e4eaa21072a45c77f9d5742101842b58bf3381033154f5.apk
-
Size
937KB
-
MD5
172db8f1dcdd7152609f820a5b6ddb0c
-
SHA1
3f28c6a36126a71a9c132209275c4c6414666ed9
-
SHA256
d5be61f974234f7ee6e4eaa21072a45c77f9d5742101842b58bf3381033154f5
-
SHA512
31a6108d1b4eef9381524d44201d2c9807614cbbd158260a6b39a74311b3bd2ebc0125ea995ca1883f2c5e3e011960698f77db170a5d5910712f9965c449c64e
-
SSDEEP
24576:Ovnc5Fq+9iXoDM4gsuXYiLHzSV+1g/G1Pa:4+FeoDM4puXV6Y1g/Ia
Malware Config
Extracted
ermac
http://193.222.96.25:3434
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Makes use of the framework's Accessibility service 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.zehopitexeyixidu.pexi Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.zehopitexeyixidu.pexi Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.zehopitexeyixidu.pexi -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 IoCs
description ioc Process Framework service call android.content.pm.IPackageManager.getInstalledApplications com.zehopitexeyixidu.pexi -
pid Process 4266 com.zehopitexeyixidu.pexi -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.zehopitexeyixidu.pexi -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.zehopitexeyixidu.pexi -
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.zehopitexeyixidu.pexi
Processes
-
com.zehopitexeyixidu.pexi1⤵
- Makes use of the framework's Accessibility service
- Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
- Removes its main activity from the application launcher
- Acquires the wake lock
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
PID:4266