General

  • Target

    dcc65f578fb635be7eabc054d7a34d5fc7c8e089d4b04d99e8376c99bbdc96d4.bin

  • Size

    1002KB

  • Sample

    240225-1xl6gade94

  • MD5

    d93d606967a9022309a48d11f24e90e8

  • SHA1

    2420298b831dd48ba0edbefa98ead27cbb6d0fb0

  • SHA256

    dcc65f578fb635be7eabc054d7a34d5fc7c8e089d4b04d99e8376c99bbdc96d4

  • SHA512

    392a05c713763b0310b6b7babd2731c1b26dffd45f1ea399541ee30dcf759e1f94c5c820264e6027202bee870b649f87c2dd8b54a4511b0c504187407df30047

  • SSDEEP

    24576:0A8I2eBvyQnP5v6oFk/h4ffa/pUnZBG5d89d8nd80d8Ed8Vd8ad8Fd8kd8Bd8oah:E1gyk5vJ44fkxh

Malware Config

Extracted

Family

ermac

C2

http://20.0.144.123:3434

AES_key

Targets

    • Target

      dcc65f578fb635be7eabc054d7a34d5fc7c8e089d4b04d99e8376c99bbdc96d4.bin

    • Size

      1002KB

    • MD5

      d93d606967a9022309a48d11f24e90e8

    • SHA1

      2420298b831dd48ba0edbefa98ead27cbb6d0fb0

    • SHA256

      dcc65f578fb635be7eabc054d7a34d5fc7c8e089d4b04d99e8376c99bbdc96d4

    • SHA512

      392a05c713763b0310b6b7babd2731c1b26dffd45f1ea399541ee30dcf759e1f94c5c820264e6027202bee870b649f87c2dd8b54a4511b0c504187407df30047

    • SSDEEP

      24576:0A8I2eBvyQnP5v6oFk/h4ffa/pUnZBG5d89d8nd80d8Ed8Vd8ad8Fd8kd8Bd8oah:E1gyk5vJ44fkxh

    • Ermac

      An Android banking trojan first seen in July 2021.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Acquires the wake lock

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks