General

  • Target

    96e1e6936543fd05504b345678d5888ef33a6a05378acb58c99c3e4f1e2bbd45.bin

  • Size

    1.0MB

  • Sample

    240306-1wxwksbf5s

  • MD5

    2940e2a2eeabc733277cf615293977e0

  • SHA1

    4f9b13fd4326fa850bf00ead2154d8b753d955f3

  • SHA256

    96e1e6936543fd05504b345678d5888ef33a6a05378acb58c99c3e4f1e2bbd45

  • SHA512

    f7579d4bc5c13b1c2ba6a507d3779467b6f65ecc35109cc50c4867d3ef048493d9136e75a26342e02088135eec8c2c57070eba741b64d5ed6cc3e944855b13d2

  • SSDEEP

    24576:61Dq72BPvQtWXFabEnvsG9+EXdHKLgT0CHqr:+Dj3QtMFabaL9XXigTY

Malware Config

Extracted

Family

ermac

C2

http://193.222.96.238:3434

AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key

Targets

    • Target

      96e1e6936543fd05504b345678d5888ef33a6a05378acb58c99c3e4f1e2bbd45.bin

    • Size

      1.0MB

    • MD5

      2940e2a2eeabc733277cf615293977e0

    • SHA1

      4f9b13fd4326fa850bf00ead2154d8b753d955f3

    • SHA256

      96e1e6936543fd05504b345678d5888ef33a6a05378acb58c99c3e4f1e2bbd45

    • SHA512

      f7579d4bc5c13b1c2ba6a507d3779467b6f65ecc35109cc50c4867d3ef048493d9136e75a26342e02088135eec8c2c57070eba741b64d5ed6cc3e944855b13d2

    • SSDEEP

      24576:61Dq72BPvQtWXFabEnvsG9+EXdHKLgT0CHqr:+Dj3QtMFabaL9XXigTY

    • Ermac

      An Android banking trojan first seen in July 2021.

    • Ermac2 payload

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks