General

  • Target

    c0056d1bceb624badcd3ba606e7fc37a7eb11d6674f839a6dba4cb283b718754.bin

  • Size

    907KB

  • Sample

    240223-1xkbwahg78

  • MD5

    fec3e9e336c52a240b7a8e52aaa629b5

  • SHA1

    8f77bd66b77daafc99e79c40d53791f6462e9288

  • SHA256

    c0056d1bceb624badcd3ba606e7fc37a7eb11d6674f839a6dba4cb283b718754

  • SHA512

    c84ca495db0f07ebaecfd0465238279c8173fd6522afc0ccbaf5b02805354ff84fc48eb69f2b6dff84c1bcfb580b051d888a29d1b20488141b040c6b9e69bbdf

  • SSDEEP

    12288:jk3mL3Mjc5PlDsMeCTRfDlWACGclNOLfq/XfQKBoxIWxeIp3dSweaJVugA4qDuPC:o3mYjuDsMRXCGclIe//0b5zSuXug/lPC

Malware Config

Extracted

Family

ermac

C2

http://5.42.67.88:3434

AES_key
AES_key

Targets

    • Target

      c0056d1bceb624badcd3ba606e7fc37a7eb11d6674f839a6dba4cb283b718754.bin

    • Size

      907KB

    • MD5

      fec3e9e336c52a240b7a8e52aaa629b5

    • SHA1

      8f77bd66b77daafc99e79c40d53791f6462e9288

    • SHA256

      c0056d1bceb624badcd3ba606e7fc37a7eb11d6674f839a6dba4cb283b718754

    • SHA512

      c84ca495db0f07ebaecfd0465238279c8173fd6522afc0ccbaf5b02805354ff84fc48eb69f2b6dff84c1bcfb580b051d888a29d1b20488141b040c6b9e69bbdf

    • SSDEEP

      12288:jk3mL3Mjc5PlDsMeCTRfDlWACGclNOLfq/XfQKBoxIWxeIp3dSweaJVugA4qDuPC:o3mYjuDsMRXCGclIe//0b5zSuXug/lPC

    • Ermac

      An Android banking trojan first seen in July 2021.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Removes its main activity from the application launcher

    • Requests enabling of the accessibility settings.

    • Acquires the wake lock

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks