Analysis
-
max time kernel
150s -
max time network
155s -
platform
android_x86 -
resource
android-x86-arm-20240221-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240221-enlocale:en-usos:android-9-x86system -
submitted
27-02-2024 22:00
Behavioral task
behavioral1
Sample
33cdbe122b9770036722663c25cf778b6480973d8acf03c5a926f1b8b4d27e03.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
33cdbe122b9770036722663c25cf778b6480973d8acf03c5a926f1b8b4d27e03.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
33cdbe122b9770036722663c25cf778b6480973d8acf03c5a926f1b8b4d27e03.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
33cdbe122b9770036722663c25cf778b6480973d8acf03c5a926f1b8b4d27e03.apk
-
Size
1.3MB
-
MD5
5086a26a597b08bcced09645ce779827
-
SHA1
48c041273dfad4e45fd39bc998190586c6fbb23b
-
SHA256
33cdbe122b9770036722663c25cf778b6480973d8acf03c5a926f1b8b4d27e03
-
SHA512
9213ef314d1b65f2751e4d78e63d8e3051654c55d10217453fc2123fc31f34f428bca6dd180ad49914a72a35fd27da7e301b735d32179a96867d0191589c02cf
-
SSDEEP
24576:aGTQvsnp/n891veoYJjrxBld7LMcnw6cmbDtz0uhuh1tzBozSkHdjDAg/OzfNNA:MCp/8912zJ/xBld7wcB3t/oDttDWAg/R
Malware Config
Extracted
ermac
http://94.156.8.245:3434
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Makes use of the framework's Accessibility service 2 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.wuxozeyoyokeva.fupuviro Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.wuxozeyoyokeva.fupuviro Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.wuxozeyoyokeva.fupuviro -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs 1 IoCs
description ioc Process Framework service call android.content.pm.IPackageManager.getInstalledApplications com.wuxozeyoyokeva.fupuviro -
pid Process 4181 com.wuxozeyoyokeva.fupuviro -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.wuxozeyoyokeva.fupuviro -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.wuxozeyoyokeva.fupuviro -
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.wuxozeyoyokeva.fupuviro
Processes
-
com.wuxozeyoyokeva.fupuviro1⤵
- Makes use of the framework's Accessibility service
- Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
- Removes its main activity from the application launcher
- Acquires the wake lock
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
PID:4181