General

  • Target

    8c321ba5108cd655420d2f9f1131629410beaffded8aa7c104357c07d8d6c57a.bin

  • Size

    1.0MB

  • Sample

    240225-1xcl2aeb9y

  • MD5

    aeae1f67dff8477ff0c4776af92140f2

  • SHA1

    9a505433dd72a80abcc2c6f600c08280b170e656

  • SHA256

    8c321ba5108cd655420d2f9f1131629410beaffded8aa7c104357c07d8d6c57a

  • SHA512

    3701c809496c17954dfef2705c563d5ff5d7b1648ba870928099746664a8c8a4576640d58215902ff3a84cd8ac7487a757840ff5b8c4210ce48100d519d8d90c

  • SSDEEP

    24576:kS9yYo6onqmlIJ2GmSiGW2NDZrZzl3U2ha0GIzHPu:kCRnm6HvBzZpl3U2h1RPu

Malware Config

Extracted

Family

ermac

C2

http://172.214.90.35:3434

AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key

Targets

    • Target

      8c321ba5108cd655420d2f9f1131629410beaffded8aa7c104357c07d8d6c57a.bin

    • Size

      1.0MB

    • MD5

      aeae1f67dff8477ff0c4776af92140f2

    • SHA1

      9a505433dd72a80abcc2c6f600c08280b170e656

    • SHA256

      8c321ba5108cd655420d2f9f1131629410beaffded8aa7c104357c07d8d6c57a

    • SHA512

      3701c809496c17954dfef2705c563d5ff5d7b1648ba870928099746664a8c8a4576640d58215902ff3a84cd8ac7487a757840ff5b8c4210ce48100d519d8d90c

    • SSDEEP

      24576:kS9yYo6onqmlIJ2GmSiGW2NDZrZzl3U2ha0GIzHPu:kCRnm6HvBzZpl3U2h1RPu

    • Ermac

      An Android banking trojan first seen in July 2021.

    • Ermac2 payload

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks