Malware Analysis Report

2024-07-28 11:43

Sample ID 240615-1yrscazfrm
Target 7c7fa2ed6d79e732b31646fb76b14d18460205d5088534f692e6c75f640da826.bin
SHA256 7c7fa2ed6d79e732b31646fb76b14d18460205d5088534f692e6c75f640da826
Tags
ermac hook banker collection credential_access discovery evasion execution impact infostealer persistence rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

7c7fa2ed6d79e732b31646fb76b14d18460205d5088534f692e6c75f640da826

Threat Level: Known bad

The file 7c7fa2ed6d79e732b31646fb76b14d18460205d5088534f692e6c75f640da826.bin was found to be: Known bad.

Malicious Activity Summary

ermac hook banker collection credential_access discovery evasion execution impact infostealer persistence rat trojan

Hook

Ermac2 payload

Ermac family

Obtains sensitive information copied to the device clipboard

Makes use of the framework's Accessibility service

Queries the phone number (MSISDN for GSM devices)

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

Queries the mobile country code (MCC)

Acquires the wake lock

Requests dangerous framework permissions

Reads information about phone network operator.

Declares services with permission to bind to the system

Declares broadcast receivers with permission to handle system events

Makes use of the framework's foreground persistence service

Queries information about the current Wi-Fi connection

Uses Crypto APIs (Might try to encrypt user data)

Schedules tasks to execute at a specified time

Registers a broadcast receiver at runtime (usually for listening for system events)

Checks memory information

Checks CPU information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-15 22:03

Signatures

Ermac family

ermac

Ermac2 payload

Description Indicator Process Target
N/A N/A N/A N/A

Declares broadcast receivers with permission to handle system events

Description Indicator Process Target
Required by device admin receivers to bind with the system. Allows apps to manage device administration features. android.permission.BIND_DEVICE_ADMIN N/A N/A

Declares services with permission to bind to the system

Description Indicator Process Target
Required by notification listener services to bind with the system. Allows apps to listen to and interact with notifications on the device. android.permission.BIND_NOTIFICATION_LISTENER_SERVICE N/A N/A
Required by accessibility services to bind with the system. Allows apps to access accessibility features. android.permission.BIND_ACCESSIBILITY_SERVICE N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows read access to the device's phone number(s). android.permission.READ_PHONE_NUMBERS N/A N/A
Allows an application to read the user's call log. android.permission.READ_CALL_LOG N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to write the user's contacts data. android.permission.WRITE_CONTACTS N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-15 22:03

Reported

2024-06-15 22:07

Platform

android-x86-arm-20240611.1-en

Max time kernel

177s

Max time network

179s

Command Line

com.tencent.mm

Signatures

Hook

rat trojan infostealer hook

Makes use of the framework's Accessibility service

collection evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries the phone number (MSISDN for GSM devices)

discovery

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Reads information about phone network operator.

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Schedules tasks to execute at a specified time

execution persistence
Description Indicator Process Target
Framework service call android.app.job.IJobScheduler.schedule N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.tencent.mm

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
NL 91.92.251.148:80 91.92.251.148 tcp
NL 91.92.251.148:80 91.92.251.148 tcp
NL 91.92.251.148:80 91.92.251.148 tcp
NL 91.92.251.148:80 91.92.251.148 tcp
GB 216.58.212.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.201.110:443 android.apis.google.com tcp

Files

/data/data/com.tencent.mm/no_backup/androidx.work.workdb-journal

MD5 62e5f33ed83e6fe265d4b6f46eb9456c
SHA1 ee130bd48cb2902fc05e96d12abc9e81a6ead6bc
SHA256 63f6f2ce9e9697cae18e7d447f6f7f5a8c24dc91a58f3bc98c208ea05a3366b0
SHA512 2589695f6c79e4906c717b911ef376a0957967cb66607fad0a61158ca0204b1830910b0e4622e3d2bdb46e029b01d98d7fd2775d446dece0d7dad3dc980289a3

/data/data/com.tencent.mm/no_backup/androidx.work.workdb

MD5 f2b4b0190b9f384ca885f0c8c9b14700
SHA1 934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA256 0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512 ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

/data/data/com.tencent.mm/no_backup/androidx.work.workdb-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/com.tencent.mm/no_backup/androidx.work.workdb-wal

MD5 08cadb75a18e5ebf7a30822c52c887e0
SHA1 b8540b52bc59c95e4468d86226dc47eb8bc4d5e3
SHA256 a244a75f40416e21f91c0d162d3ded2a7bf33c2d572a59c6707319961ccc8798
SHA512 7eefb22849afc1361518cfb687b3a50fd6ddc62dc300c533fbb70cdba830f0b8166fc0ed66102470ac35c2cbf79166560fc0334acfc9e11761c935c115f8e65c

/data/data/com.tencent.mm/no_backup/androidx.work.workdb-wal

MD5 51496913db08959d1c853acf2f963ef0
SHA1 584b6a8a4008a4ae27ebb922ac39a15c02424d77
SHA256 3ca14c332d21d491831c52c8382af4a1eb22fd9d75b9a2eaf47e1a1f1cb09b14
SHA512 092e93d5e0662000ea9b6475c64c51410921b0fbbcfb636a17d742a1e3d5a2e615036dffaeae0ba52f8c5b37f2b0a51e20b0770373abbfc6ec9096b39d39101e

/data/data/com.tencent.mm/no_backup/androidx.work.workdb-wal

MD5 77a00f321f4e8e8af80513ca308a258b
SHA1 476f9f3f11d5f4b0aa56ce746fb348bb2c36a473
SHA256 9b8facfdb73e38a58e536ac24883c691ff8d1ca56ac40212797eb9084ee20986
SHA512 36fc50e778d719fd65f6d8e9604bb687899e4fcd594e17ba20efddc3f18b581eeb122448531341791c5985cf80df7472095565b22595b31913b1944d9722c71c

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-15 22:03

Reported

2024-06-15 22:07

Platform

android-x64-20240611.1-en

Max time kernel

176s

Max time network

188s

Command Line

com.tencent.mm

Signatures

Hook

rat trojan infostealer hook

Makes use of the framework's Accessibility service

collection evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId N/A N/A

Obtains sensitive information copied to the device clipboard

collection credential_access impact
Description Indicator Process Target
Framework service call android.content.IClipboard.addPrimaryClipChangedListener N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries the phone number (MSISDN for GSM devices)

discovery

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Reads information about phone network operator.

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Schedules tasks to execute at a specified time

execution persistence
Description Indicator Process Target
Framework service call android.app.job.IJobScheduler.schedule N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.tencent.mm

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.179.234:443 tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.187.232:443 ssl.google-analytics.com tcp
NL 91.92.251.148:80 91.92.251.148 tcp
NL 91.92.251.148:80 91.92.251.148 tcp
NL 91.92.251.148:80 91.92.251.148 tcp
NL 91.92.251.148:80 91.92.251.148 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.200.14:443 android.apis.google.com tcp
NL 91.92.251.148:80 91.92.251.148 tcp
NL 91.92.251.148:80 91.92.251.148 tcp
GB 142.250.200.14:443 android.apis.google.com tcp
GB 172.217.169.66:443 tcp
GB 216.58.201.100:443 tcp
GB 216.58.201.100:443 tcp
GB 216.58.204.78:443 tcp

Files

/data/data/com.tencent.mm/no_backup/androidx.work.workdb-journal

MD5 2aa14ed7fbc58062d85d9b522ae97688
SHA1 23fb72be003bdff1bc04f4d3bf143d428e5ba238
SHA256 260f693f5eec1afa52ab618ecf728c4487bc48cb6b6944bd1176b11ba97845a7
SHA512 b3ba4cc8936e92817d06c371c0e71bebb77d5445297ca17102f25056a5c363afa9a30a6b90cef0999474f03fa716325ac5b7e72c38e7f5f8ff85cf51c956090a

/data/data/com.tencent.mm/no_backup/androidx.work.workdb

MD5 f2b4b0190b9f384ca885f0c8c9b14700
SHA1 934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA256 0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512 ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

/data/data/com.tencent.mm/no_backup/androidx.work.workdb-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/com.tencent.mm/no_backup/androidx.work.workdb-wal

MD5 60c37753b0516ddf18a5734b267334be
SHA1 88d14e3f7c4f4d4ed46749407e88d4cf20557730
SHA256 1d22d945562e66bc9892244c26a8d00e76ae0e509335688a9f510ad8f9cd8d9e
SHA512 4a6ed0c22d5327700b0ee7c5a97c5e50be443b27b35c1839c440d50c701beacdb304083e1da8b8b9201b10ad8526197ed0681d74aa7a6229751b666d7317d738

/data/data/com.tencent.mm/no_backup/androidx.work.workdb-wal

MD5 29e9840851ea2c1a7d48037afa8a2770
SHA1 2e6840f5220d9ba11e0538e85a5dfbe9139296d4
SHA256 02418cdeabbaff3f26b9379f91da29b2f20ffdae8425b56e6881e9038349d1dd
SHA512 8529fb8b38960f3d5213a0baf7a8e68a1edd7459fabf37e1d8893ab00aa24d025b08d302ab588a2407f4786397b71133509dd9ebeb9db6810c297f01239d0133

/data/data/com.tencent.mm/no_backup/androidx.work.workdb-wal

MD5 e93d56a9e3aaeb344de18ffd0b52ecaa
SHA1 64712e0adf239a6214f08b35106f72db5050e9b6
SHA256 abda1ed1d385bf491f15efafd1da1db99b4f3a3dd40bc1ed6c5f3fb3a2ed6cea
SHA512 27394f4b5de8158037d9865c51212dec795ab7ad249fb10115c6ab48763aaaad9d02b0854be5ae85d33d739917e86a54dc2bdf22e3bf78d9113c1d65addf6a07

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-15 22:03

Reported

2024-06-15 22:07

Platform

android-x64-arm64-20240611.1-en

Max time network

140s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.187.238:443 tcp
BE 74.125.133.188:5228 tcp
GB 142.250.179.228:443 tcp
GB 142.250.200.2:443 tcp
GB 216.58.201.110:443 tcp
US 1.1.1.1:53 www.google.com udp
GB 216.58.213.4:443 www.google.com tcp
US 1.1.1.1:53 accounts.google.com udp
BE 74.125.133.84:443 accounts.google.com tcp
US 1.1.1.1:53 www.youtube.com udp
GB 172.217.169.14:443 www.youtube.com udp
GB 172.217.169.14:443 www.youtube.com tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.200.46:443 android.apis.google.com tcp
US 1.1.1.1:53 growth-pa.googleapis.com udp
US 1.1.1.1:53 lh3-dz.googleusercontent.com udp
GB 172.217.16.225:443 lh3-dz.googleusercontent.com tcp
US 1.1.1.1:53 lh3.googleusercontent.com udp
GB 172.217.16.225:443 lh3.googleusercontent.com tcp
US 1.1.1.1:53 accounts.google.com udp
BE 74.125.133.84:443 accounts.google.com tcp
GB 172.217.169.14:443 www.youtube.com udp
GB 172.217.169.14:443 www.youtube.com tcp
US 1.1.1.1:53 www.google.com udp
GB 142.250.187.228:443 www.google.com udp
GB 142.250.187.228:443 www.google.com tcp
GB 142.250.187.228:443 www.google.com tcp
US 1.1.1.1:53 mdh-pa.googleapis.com udp
US 1.1.1.1:53 update.googleapis.com udp
GB 216.58.212.195:443 update.googleapis.com tcp

Files

N/A