Analysis
-
max time kernel
152s -
max time network
161s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
06-03-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
96e1e6936543fd05504b345678d5888ef33a6a05378acb58c99c3e4f1e2bbd45.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
96e1e6936543fd05504b345678d5888ef33a6a05378acb58c99c3e4f1e2bbd45.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
96e1e6936543fd05504b345678d5888ef33a6a05378acb58c99c3e4f1e2bbd45.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
96e1e6936543fd05504b345678d5888ef33a6a05378acb58c99c3e4f1e2bbd45.apk
-
Size
1.0MB
-
MD5
2940e2a2eeabc733277cf615293977e0
-
SHA1
4f9b13fd4326fa850bf00ead2154d8b753d955f3
-
SHA256
96e1e6936543fd05504b345678d5888ef33a6a05378acb58c99c3e4f1e2bbd45
-
SHA512
f7579d4bc5c13b1c2ba6a507d3779467b6f65ecc35109cc50c4867d3ef048493d9136e75a26342e02088135eec8c2c57070eba741b64d5ed6cc3e944855b13d2
-
SSDEEP
24576:61Dq72BPvQtWXFabEnvsG9+EXdHKLgT0CHqr:+Dj3QtMFabaL9XXigTY
Malware Config
Extracted
ermac
http://193.222.96.238:3434
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac2 payload 1 IoCs
resource yara_rule behavioral2/files/fstream-1.dat family_ermac2 -
Makes use of the framework's Accessibility service 2 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.liwuvejoneni.diziwexa Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.liwuvejoneni.diziwexa Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.liwuvejoneni.diziwexa -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs 1 IoCs
description ioc Process Framework service call android.content.pm.IPackageManager.getInstalledApplications com.liwuvejoneni.diziwexa -
pid Process 5096 com.liwuvejoneni.diziwexa -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.liwuvejoneni.diziwexa/app_ded/AAyzi8eeBbknRbDmg2be7RTEtuA6qw6K.dex 5096 com.liwuvejoneni.diziwexa /data/user/0/com.liwuvejoneni.diziwexa/app_ded/AAyzi8eeBbknRbDmg2be7RTEtuA6qw6K.dex 5096 com.liwuvejoneni.diziwexa -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.liwuvejoneni.diziwexa -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.liwuvejoneni.diziwexa
Processes
-
com.liwuvejoneni.diziwexa1⤵
- Makes use of the framework's Accessibility service
- Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Acquires the wake lock
- Uses Crypto APIs (Might try to encrypt user data)
PID:5096
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
917KB
MD518d12185a1265e1847a264e9b2d4b3fc
SHA1a63b0cfde0eb3e2519bd9c396a3882734c00041e
SHA256884577117bc90b72ea600e30f065e9443faf60eec5eb16a7403f647b8925a53a
SHA5128ab38670e88be86bb2074552d872db82b1793143586656c6586b9cb23c3bc27afede732cd03451741a1519ca392f28d39a66375990ce88eb9722f232cf28670d