Analysis
-
max time kernel
151s -
max time network
160s -
platform
android_x64 -
resource
android-x64-arm64-20231215-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20231215-enlocale:en-usos:android-11-x64system -
submitted
26-01-2024 22:03
Behavioral task
behavioral1
Sample
5908a10d37db029110e17964d83f17b9464d4da23b85f494f38df3bffa867b04.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
5908a10d37db029110e17964d83f17b9464d4da23b85f494f38df3bffa867b04.apk
Resource
android-x64-20231215-en
General
-
Target
5908a10d37db029110e17964d83f17b9464d4da23b85f494f38df3bffa867b04.apk
-
Size
1002KB
-
MD5
0833537d187da53ecd06cdd534e0a058
-
SHA1
6fc84d493ca366c8cb80e8fbcfe61146fbfbfcba
-
SHA256
5908a10d37db029110e17964d83f17b9464d4da23b85f494f38df3bffa867b04
-
SHA512
1f99b92c033247596440e2510040bfc030219a6bb5c652a20669b2325d6d3b2bae75284a018ae9af03c3e92bb01de34e68bab9c095ed2d2069f1b895b15b1b29
-
SSDEEP
24576:0cTRRhmisPuir4ffkZnwjVszd87d8Nd8qd8Gd8Pd84d8zd82d8Dd83x:jTRRwiO4fWHx
Malware Config
Extracted
ermac
http://159.65.52.64:3434
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Makes use of the framework's Accessibility service 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId nusku.ermacv2.apk Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId nusku.ermacv2.apk Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText nusku.ermacv2.apk -
pid Process 4637 nusku.ermacv2.apk -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock nusku.ermacv2.apk -
Queries the unique device ID (IMEI, MEID, IMSI)
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS nusku.ermacv2.apk -
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal nusku.ermacv2.apk
Processes
-
nusku.ermacv2.apk1⤵
- Makes use of the framework's Accessibility service
- Removes its main activity from the application launcher
- Acquires the wake lock
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
PID:4637