Analysis
-
max time kernel
150s -
max time network
148s -
platform
android_x86 -
resource
android-x86-arm-20240221-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240221-enlocale:en-usos:android-9-x86system -
submitted
10-04-2024 22:02
Static task
static1
Behavioral task
behavioral1
Sample
537504bf9c2fa42d1facd51d2f5f6261508c5dd69fbe01bed020bda16c2e138b.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
537504bf9c2fa42d1facd51d2f5f6261508c5dd69fbe01bed020bda16c2e138b.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
537504bf9c2fa42d1facd51d2f5f6261508c5dd69fbe01bed020bda16c2e138b.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
537504bf9c2fa42d1facd51d2f5f6261508c5dd69fbe01bed020bda16c2e138b.apk
-
Size
1.1MB
-
MD5
5b3a809660ca73851ebe0e4576fe402a
-
SHA1
647844f54aca49e1274d48e3b16b153c9b1c7ce2
-
SHA256
537504bf9c2fa42d1facd51d2f5f6261508c5dd69fbe01bed020bda16c2e138b
-
SHA512
4bb17f35b043ea576562470dd8054ec26a973fcf19e38613e9913f6f907fbf54e23654bd5f91b43b4f6f4555756a9b819405f819cbbc86f04665195994022957
-
SSDEEP
24576:A+Dg/shD/5kvJ921d5yGpqGB2VkoZJaAP+Ce/ycFN9sJCTXgl9o+:JDg/E5kvJ9aFpCtaAW/ycF7s4jgl9H
Malware Config
Extracted
ermac
http://173.212.219.194:3434
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac2 payload 2 IoCs
resource yara_rule behavioral1/files/fstream-1.dat family_ermac2 behavioral1/memory/4231-1.dex family_ermac2 -
Makes use of the framework's Accessibility service 2 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId kader.inatbox.apk Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId kader.inatbox.apk Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText kader.inatbox.apk -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs 1 IoCs
description ioc Process Framework service call android.content.pm.IPackageManager.getInstalledApplications kader.inatbox.apk -
pid Process 4231 kader.inatbox.apk -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo kader.inatbox.apk -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo kader.inatbox.apk -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/kader.inatbox.apk/app_ded/OB2fZssE2IN9i0PK9Z07mEtH07ImaAyT.dex 4231 kader.inatbox.apk /data/user/0/kader.inatbox.apk/app_ded/OB2fZssE2IN9i0PK9Z07mEtH07ImaAyT.dex 4304 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/kader.inatbox.apk/app_ded/OB2fZssE2IN9i0PK9Z07mEtH07ImaAyT.dex --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/kader.inatbox.apk/app_ded/oat/x86/OB2fZssE2IN9i0PK9Z07mEtH07ImaAyT.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/kader.inatbox.apk/app_ded/OB2fZssE2IN9i0PK9Z07mEtH07ImaAyT.dex 4231 kader.inatbox.apk -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground kader.inatbox.apk -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock kader.inatbox.apk -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS kader.inatbox.apk -
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal kader.inatbox.apk
Processes
-
kader.inatbox.apk1⤵
- Makes use of the framework's Accessibility service
- Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
- Removes its main activity from the application launcher
- Checks CPU information
- Checks memory information
- Loads dropped Dex/Jar
- Makes use of the framework's foreground persistence service
- Acquires the wake lock
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
PID:4231 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/kader.inatbox.apk/app_ded/OB2fZssE2IN9i0PK9Z07mEtH07ImaAyT.dex --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/kader.inatbox.apk/app_ded/oat/x86/OB2fZssE2IN9i0PK9Z07mEtH07ImaAyT.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4304
-
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
684KB
MD5b8ab5713ac0c2f9685ba6cff1d5c886d
SHA1a41c13106c9690c114b132cf50be9d6b0eedd1de
SHA256a04a9dc5669b2963c84bb8a891a647f55e865b8120e53fb83befd40d47425d63
SHA512e293a82f9905e137ee8d2925efd7fdc257076a23f5b9874be2029d2a38160876201f9647667c6a4e5b50da90ff4409f939e4e3879be3a83636b4cdebb76da322
-
Filesize
684KB
MD5d73a5fd84ddac7b4324ee751eebb379c
SHA19de3037eae4167b97ad36be602e73f2bbd07eeff
SHA2561e70fae56a1ea61f3b1f186eb4480e4330af90fe6a4b97d5862e6fd6c5257458
SHA512b9ae4bd4526fb5ca731c09c694ec2fdb2b77ceea033e35042d0954c9f36adf50ee6527c9a13f934418cbffe4ec0d0933857545ee465c0e367292fb5093e0d708