Analysis

  • max time kernel
    150s
  • max time network
    158s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240221-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240221-enlocale:en-usos:android-11-x64system
  • submitted
    10-04-2024 22:02

General

  • Target

    537504bf9c2fa42d1facd51d2f5f6261508c5dd69fbe01bed020bda16c2e138b.apk

  • Size

    1.1MB

  • MD5

    5b3a809660ca73851ebe0e4576fe402a

  • SHA1

    647844f54aca49e1274d48e3b16b153c9b1c7ce2

  • SHA256

    537504bf9c2fa42d1facd51d2f5f6261508c5dd69fbe01bed020bda16c2e138b

  • SHA512

    4bb17f35b043ea576562470dd8054ec26a973fcf19e38613e9913f6f907fbf54e23654bd5f91b43b4f6f4555756a9b819405f819cbbc86f04665195994022957

  • SSDEEP

    24576:A+Dg/shD/5kvJ921d5yGpqGB2VkoZJaAP+Ce/ycFN9sJCTXgl9o+:JDg/E5kvJ9aFpCtaAW/ycF7s4jgl9H

Malware Config

Extracted

Family

ermac

C2

http://173.212.219.194:3434

AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key

Signatures

  • Ermac

    An Android banking trojan first seen in July 2021.

  • Ermac2 payload 1 IoCs
  • Makes use of the framework's Accessibility service 2 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs

    Checks CPU information which indicate if the system is an emulator.

  • Checks memory information 2 TTPs 1 IoCs

    Checks memory information which indicate if the system is an emulator.

  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 IoCs

Processes

  • kader.inatbox.apk
    1⤵
    • Makes use of the framework's Accessibility service
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
    • Removes its main activity from the application launcher
    • Checks CPU information
    • Checks memory information
    • Loads dropped Dex/Jar
    • Makes use of the framework's foreground persistence service
    • Acquires the wake lock
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4423

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/kader.inatbox.apk/app_ded/NFkxUHzSVhSP6bRt7h0ME9eycVoWUF7P.dex

    Filesize

    684KB

    MD5

    b8ab5713ac0c2f9685ba6cff1d5c886d

    SHA1

    a41c13106c9690c114b132cf50be9d6b0eedd1de

    SHA256

    a04a9dc5669b2963c84bb8a891a647f55e865b8120e53fb83befd40d47425d63

    SHA512

    e293a82f9905e137ee8d2925efd7fdc257076a23f5b9874be2029d2a38160876201f9647667c6a4e5b50da90ff4409f939e4e3879be3a83636b4cdebb76da322