General

  • Target

    ac4d8c09ecf4f561945721fc4fa2f1520e2983bac31816f2cac7e99640d9aaed.bin

  • Size

    1023KB

  • Sample

    240226-1xz3bshc59

  • MD5

    d2d06e479ace29b2719540ae361f599a

  • SHA1

    a37cc1a6d8a04c6221fd5845afe43480103d9b2a

  • SHA256

    ac4d8c09ecf4f561945721fc4fa2f1520e2983bac31816f2cac7e99640d9aaed

  • SHA512

    c5f919b000dec253d232a1f344d62f245e04ad6ab1f74e7fe77c361f2900d360a7b128831a1f44f3df553b45bb20b599f3804ea523f9293b00995934088c9a75

  • SSDEEP

    24576:NvXJ5Zwtmgjd29BRb/ScgdInUI0pXkNSGEvhTe:ZhHgh2PRHUENSnha

Malware Config

Extracted

Family

ermac

C2

http://20.0.153.70:3434

AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key

Targets

    • Target

      ac4d8c09ecf4f561945721fc4fa2f1520e2983bac31816f2cac7e99640d9aaed.bin

    • Size

      1023KB

    • MD5

      d2d06e479ace29b2719540ae361f599a

    • SHA1

      a37cc1a6d8a04c6221fd5845afe43480103d9b2a

    • SHA256

      ac4d8c09ecf4f561945721fc4fa2f1520e2983bac31816f2cac7e99640d9aaed

    • SHA512

      c5f919b000dec253d232a1f344d62f245e04ad6ab1f74e7fe77c361f2900d360a7b128831a1f44f3df553b45bb20b599f3804ea523f9293b00995934088c9a75

    • SSDEEP

      24576:NvXJ5Zwtmgjd29BRb/ScgdInUI0pXkNSGEvhTe:ZhHgh2PRHUENSnha

    • Ermac

      An Android banking trojan first seen in July 2021.

    • Ermac2 payload

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks