Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    android_x86
  • resource
    android-x86-arm-20240221-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240221-enlocale:en-usos:android-9-x86system
  • submitted
    10-04-2024 22:02

General

  • Target

    537504bf9c2fa42d1facd51d2f5f6261508c5dd69fbe01bed020bda16c2e138b.apk

  • Size

    1.1MB

  • MD5

    5b3a809660ca73851ebe0e4576fe402a

  • SHA1

    647844f54aca49e1274d48e3b16b153c9b1c7ce2

  • SHA256

    537504bf9c2fa42d1facd51d2f5f6261508c5dd69fbe01bed020bda16c2e138b

  • SHA512

    4bb17f35b043ea576562470dd8054ec26a973fcf19e38613e9913f6f907fbf54e23654bd5f91b43b4f6f4555756a9b819405f819cbbc86f04665195994022957

  • SSDEEP

    24576:A+Dg/shD/5kvJ921d5yGpqGB2VkoZJaAP+Ce/ycFN9sJCTXgl9o+:JDg/E5kvJ9aFpCtaAW/ycF7s4jgl9H

Malware Config

Extracted

Family

ermac

C2

http://173.212.219.194:3434

AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key

Signatures

  • Ermac

    An Android banking trojan first seen in July 2021.

  • Ermac2 payload 2 IoCs
  • Makes use of the framework's Accessibility service 2 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs

    Checks CPU information which indicate if the system is an emulator.

  • Checks memory information 2 TTPs 1 IoCs

    Checks memory information which indicate if the system is an emulator.

  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Acquires the wake lock 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 IoCs

Processes

  • kader.inatbox.apk
    1⤵
    • Makes use of the framework's Accessibility service
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
    • Removes its main activity from the application launcher
    • Checks CPU information
    • Checks memory information
    • Loads dropped Dex/Jar
    • Makes use of the framework's foreground persistence service
    • Acquires the wake lock
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4231
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/kader.inatbox.apk/app_ded/OB2fZssE2IN9i0PK9Z07mEtH07ImaAyT.dex --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/kader.inatbox.apk/app_ded/oat/x86/OB2fZssE2IN9i0PK9Z07mEtH07ImaAyT.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4304

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/kader.inatbox.apk/app_ded/OB2fZssE2IN9i0PK9Z07mEtH07ImaAyT.dex

    Filesize

    684KB

    MD5

    b8ab5713ac0c2f9685ba6cff1d5c886d

    SHA1

    a41c13106c9690c114b132cf50be9d6b0eedd1de

    SHA256

    a04a9dc5669b2963c84bb8a891a647f55e865b8120e53fb83befd40d47425d63

    SHA512

    e293a82f9905e137ee8d2925efd7fdc257076a23f5b9874be2029d2a38160876201f9647667c6a4e5b50da90ff4409f939e4e3879be3a83636b4cdebb76da322

  • /data/user/0/kader.inatbox.apk/app_ded/OB2fZssE2IN9i0PK9Z07mEtH07ImaAyT.dex

    Filesize

    684KB

    MD5

    d73a5fd84ddac7b4324ee751eebb379c

    SHA1

    9de3037eae4167b97ad36be602e73f2bbd07eeff

    SHA256

    1e70fae56a1ea61f3b1f186eb4480e4330af90fe6a4b97d5862e6fd6c5257458

    SHA512

    b9ae4bd4526fb5ca731c09c694ec2fdb2b77ceea033e35042d0954c9f36adf50ee6527c9a13f934418cbffe4ec0d0933857545ee465c0e367292fb5093e0d708