Analysis
-
max time kernel
150s -
max time network
160s -
platform
android_x64 -
resource
android-x64-arm64-20231215-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20231215-enlocale:en-usos:android-11-x64system -
submitted
24-01-2024 22:03
Behavioral task
behavioral1
Sample
8d7625059315f37b0fde19b657d8aded842f052699c208d6b0031720460918dd.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
8d7625059315f37b0fde19b657d8aded842f052699c208d6b0031720460918dd.apk
Resource
android-x64-20231215-en
General
-
Target
8d7625059315f37b0fde19b657d8aded842f052699c208d6b0031720460918dd.apk
-
Size
1.3MB
-
MD5
97c7b633a249b19bee41812c3d7eee6d
-
SHA1
49920634eeb3aaf79e5cb4e75b252f6ff4d91ccf
-
SHA256
8d7625059315f37b0fde19b657d8aded842f052699c208d6b0031720460918dd
-
SHA512
96d23ac66b4fb7ac402328eb5e293114c388a34e047cdb5b39e356f3cc19d29ed28e541be9c3d3e4c86c20828c40b3c258e778d7c8d0faa0b32e5446d8126fd1
-
SSDEEP
12288:y3jdQjsHgc1d5L/flulcmPIgApVDXUEe2B:y3jdjN/fIlcZgS1UEBB
Malware Config
Extracted
ermac
http://185.172.128.91:3434
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Makes use of the framework's Accessibility service 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId tdevs.cod.apk Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId tdevs.cod.apk Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText tdevs.cod.apk -
pid Process 4641 tdevs.cod.apk -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock tdevs.cod.apk -
Queries the unique device ID (IMEI, MEID, IMSI)
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS tdevs.cod.apk -
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal tdevs.cod.apk
Processes
-
tdevs.cod.apk1⤵
- Makes use of the framework's Accessibility service
- Removes its main activity from the application launcher
- Acquires the wake lock
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
PID:4641