General

  • Target

    62efd5d519428039d74ed53bf58dbba06800dbb1b6655f1e3f2ec7f26c5d0c08.bin

  • Size

    919KB

  • Sample

    240226-1xvgvahc57

  • MD5

    8aec769a858d9e202e8922f14b01af26

  • SHA1

    7ad24fe10bf788146ce100683183b76426b6ac32

  • SHA256

    62efd5d519428039d74ed53bf58dbba06800dbb1b6655f1e3f2ec7f26c5d0c08

  • SHA512

    127b685330580170c174e8375f43539dfa86e29b2372fe89ca316838646abc2e2c625742f5155468209e755921e9e5a5e1834ee24e4c09423ef10da683cb48e2

  • SSDEEP

    24576:dImVbUOnxUGwbGBgXpYc3inzSF3FQg/YVP:2mVbdBM3trQg/2

Malware Config

Extracted

Family

ermac

C2

http://20.0.153.70:3434

AES_key
AES_key

Targets

    • Target

      62efd5d519428039d74ed53bf58dbba06800dbb1b6655f1e3f2ec7f26c5d0c08.bin

    • Size

      919KB

    • MD5

      8aec769a858d9e202e8922f14b01af26

    • SHA1

      7ad24fe10bf788146ce100683183b76426b6ac32

    • SHA256

      62efd5d519428039d74ed53bf58dbba06800dbb1b6655f1e3f2ec7f26c5d0c08

    • SHA512

      127b685330580170c174e8375f43539dfa86e29b2372fe89ca316838646abc2e2c625742f5155468209e755921e9e5a5e1834ee24e4c09423ef10da683cb48e2

    • SSDEEP

      24576:dImVbUOnxUGwbGBgXpYc3inzSF3FQg/YVP:2mVbdBM3trQg/2

    • Ermac

      An Android banking trojan first seen in July 2021.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Removes its main activity from the application launcher

    • Acquires the wake lock

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks