Analysis

  • max time kernel
    151s
  • max time network
    159s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240221-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240221-enlocale:en-usos:android-11-x64system
  • submitted
    06-03-2024 22:00

General

  • Target

    96e1e6936543fd05504b345678d5888ef33a6a05378acb58c99c3e4f1e2bbd45.apk

  • Size

    1.0MB

  • MD5

    2940e2a2eeabc733277cf615293977e0

  • SHA1

    4f9b13fd4326fa850bf00ead2154d8b753d955f3

  • SHA256

    96e1e6936543fd05504b345678d5888ef33a6a05378acb58c99c3e4f1e2bbd45

  • SHA512

    f7579d4bc5c13b1c2ba6a507d3779467b6f65ecc35109cc50c4867d3ef048493d9136e75a26342e02088135eec8c2c57070eba741b64d5ed6cc3e944855b13d2

  • SSDEEP

    24576:61Dq72BPvQtWXFabEnvsG9+EXdHKLgT0CHqr:+Dj3QtMFabaL9XXigTY

Malware Config

Extracted

Family

ermac

C2

http://193.222.96.238:3434

AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key

Signatures

  • Ermac

    An Android banking trojan first seen in July 2021.

  • Ermac2 payload 1 IoCs
  • Makes use of the framework's Accessibility service 2 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Acquires the wake lock 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 IoCs

Processes

  • com.liwuvejoneni.diziwexa
    1⤵
    • Makes use of the framework's Accessibility service
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Acquires the wake lock
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4694

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.liwuvejoneni.diziwexa/app_ded/7I9J1pa6Yc4R0r5YE5xB4SQiQxC134a8.dex

    Filesize

    917KB

    MD5

    18d12185a1265e1847a264e9b2d4b3fc

    SHA1

    a63b0cfde0eb3e2519bd9c396a3882734c00041e

    SHA256

    884577117bc90b72ea600e30f065e9443faf60eec5eb16a7403f647b8925a53a

    SHA512

    8ab38670e88be86bb2074552d872db82b1793143586656c6586b9cb23c3bc27afede732cd03451741a1519ca392f28d39a66375990ce88eb9722f232cf28670d