Analysis
-
max time kernel
149s -
max time network
155s -
platform
android_x86 -
resource
android-x86-arm-20231215-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20231215-enlocale:en-usos:android-9-x86system -
submitted
15-02-2024 22:01
Behavioral task
behavioral1
Sample
f3268bde4497dfc3ddf1102373187bed157bd09acf8942783fa8b0b15a97b5b7.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
f3268bde4497dfc3ddf1102373187bed157bd09acf8942783fa8b0b15a97b5b7.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
f3268bde4497dfc3ddf1102373187bed157bd09acf8942783fa8b0b15a97b5b7.apk
Resource
android-x64-arm64-20231215-en
General
-
Target
f3268bde4497dfc3ddf1102373187bed157bd09acf8942783fa8b0b15a97b5b7.apk
-
Size
1.3MB
-
MD5
ea335cfb06458bc13d6ac33d5ca676cb
-
SHA1
7b477b6eefd0392a887a4f83e508def7202b603c
-
SHA256
f3268bde4497dfc3ddf1102373187bed157bd09acf8942783fa8b0b15a97b5b7
-
SHA512
3b5ae2666e15ce773a505eb66958efcf7d8b6bc4e05cac5bc84a1e8acf19ffd75774d16b644963ceab52ba0045e7d0f85f670c96fa88c167313fd200c389a120
-
SSDEEP
24576:TaYGLtDwVXoC0ezwGnc8Sa0i06mXa/LkwZC8df:+DLJwVXmkP06mXa/LkwZC8R
Malware Config
Extracted
ermac
http://77.105.132.7:3434
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Makes use of the framework's Accessibility service 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId nusku.OxoChat.apk Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId nusku.OxoChat.apk Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText nusku.OxoChat.apk -
pid Process 4253 nusku.OxoChat.apk -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock nusku.OxoChat.apk -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS nusku.OxoChat.apk -
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal nusku.OxoChat.apk
Processes
-
nusku.OxoChat.apk1⤵
- Makes use of the framework's Accessibility service
- Removes its main activity from the application launcher
- Acquires the wake lock
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
PID:4253