Malware Analysis Report

2024-07-28 11:43

Sample ID 240618-ye9gyazbkq
Target 0d0c23a96dc90d431a8ce01f0cee1575.zip
SHA256 aea84ebd9c1194efa69033231fe055a9fa79f3e740825965ab2767c4f61b0531
Tags
hook banker collection credential_access discovery evasion execution impact infostealer persistence rat trojan ermac
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

aea84ebd9c1194efa69033231fe055a9fa79f3e740825965ab2767c4f61b0531

Threat Level: Known bad

The file 0d0c23a96dc90d431a8ce01f0cee1575.zip was found to be: Known bad.

Malicious Activity Summary

hook banker collection credential_access discovery evasion execution impact infostealer persistence rat trojan ermac

Ermac family

Hook

Ermac2 payload

Hook family

Makes use of the framework's Accessibility service

Queries information about running processes on the device

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

Queries the phone number (MSISDN for GSM devices)

Obtains sensitive information copied to the device clipboard

Queries the mobile country code (MCC)

Declares services with permission to bind to the system

Makes use of the framework's foreground persistence service

Acquires the wake lock

Queries information about the current Wi-Fi connection

Reads information about phone network operator.

Requests dangerous framework permissions

Declares broadcast receivers with permission to handle system events

Uses Crypto APIs (Might try to encrypt user data)

Registers a broadcast receiver at runtime (usually for listening for system events)

Schedules tasks to execute at a specified time

Checks CPU information

Checks memory information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-18 19:43

Signatures

Ermac family

ermac

Ermac2 payload

Description Indicator Process Target
N/A N/A N/A N/A

Hook family

hook

Declares broadcast receivers with permission to handle system events

Description Indicator Process Target
Required by device admin receivers to bind with the system. Allows apps to manage device administration features. android.permission.BIND_DEVICE_ADMIN N/A N/A

Declares services with permission to bind to the system

Description Indicator Process Target
Required by notification listener services to bind with the system. Allows apps to listen to and interact with notifications on the device. android.permission.BIND_NOTIFICATION_LISTENER_SERVICE N/A N/A
Required by accessibility services to bind with the system. Allows apps to access accessibility features. android.permission.BIND_ACCESSIBILITY_SERVICE N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows read access to the device's phone number(s). android.permission.READ_PHONE_NUMBERS N/A N/A
Allows an application to read the user's call log. android.permission.READ_CALL_LOG N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to write the user's contacts data. android.permission.WRITE_CONTACTS N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-18 19:43

Reported

2024-06-18 19:46

Platform

android-x64-20240611.1-en

Max time kernel

177s

Max time network

186s

Command Line

com.tencent.mm

Signatures

Hook

rat trojan infostealer hook

Makes use of the framework's Accessibility service

collection evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A

Obtains sensitive information copied to the device clipboard

collection credential_access impact
Description Indicator Process Target
Framework service call android.content.IClipboard.addPrimaryClipChangedListener N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Queries the phone number (MSISDN for GSM devices)

discovery

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Reads information about phone network operator.

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Schedules tasks to execute at a specified time

execution persistence
Description Indicator Process Target
Framework service call android.app.job.IJobScheduler.schedule N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.tencent.mm

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 172.217.16.234:443 tcp
NL 91.92.254.104:3434 91.92.254.104 tcp
NL 91.92.254.104:3434 91.92.254.104 tcp
NL 91.92.254.104:3434 91.92.254.104 tcp
GB 172.217.16.232:443 ssl.google-analytics.com tcp
NL 91.92.254.104:3434 91.92.254.104 tcp
NL 91.92.254.104:3434 91.92.254.104 tcp
GB 142.250.178.14:443 tcp
GB 142.250.187.226:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
GB 216.58.204.78:443 tcp
US 1.1.1.1:53 g.tenor.com udp
GB 142.250.187.202:443 g.tenor.com tcp
GB 142.250.179.228:443 tcp
GB 142.250.179.228:443 tcp

Files

/data/data/com.tencent.mm/no_backup/androidx.work.workdb-journal

MD5 e76eae44349031f39c80f3c5858d6009
SHA1 f6bea0951149462ad7b5f46626d1b3157a211e14
SHA256 89394ae595aba0b64c7cb320847904262efb359c62dfc27ac87a5fd556fed2d0
SHA512 740382d2776b6c7a3433167d75ee83dd01b7fb614b86f60474295886c2f117f259dd03ce54df36576b1eec957d69a430678fe8be9e62e821cba4c1aa99527201

/data/data/com.tencent.mm/no_backup/androidx.work.workdb

MD5 f2b4b0190b9f384ca885f0c8c9b14700
SHA1 934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA256 0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512 ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

/data/data/com.tencent.mm/no_backup/androidx.work.workdb-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/com.tencent.mm/no_backup/androidx.work.workdb-wal

MD5 70f052ff0cf53e30b0c3e8eef3c7fcac
SHA1 61bce454b5cc8975f0e5ed3bd28dd119eb8d53c2
SHA256 6fd43130d6c519b67a5b7c7b70f91d0d1d215b3503ba875134ef64ffd8bd9591
SHA512 cacf95250eb32bc92d9e9e4fda802a2c48cacd9cd67782f13de44ffbac0afa2781a5ef18e451a2911a933ec06ce126754958c6f1085e8f84fe7c1b93eaf26254

/data/data/com.tencent.mm/no_backup/androidx.work.workdb-wal

MD5 ca5b41764973277c20498a67e241889c
SHA1 7b605ae5ebe6d7da2b2ddbf7242d88f10d889878
SHA256 3e4311b6314a7e1584b0a3deef3e65ea0ddf81892903eb66de962325d5b0c142
SHA512 05b0bc486a9ddfbb680a2768f0564fcf9c96eaeaf9b5e194b4d0db96afec6654fc3764ea71f81727ec1d811a59e153f14087ddb10d7076fc942fb889df2b5f5d

/data/data/com.tencent.mm/no_backup/androidx.work.workdb-wal

MD5 1199ae5cf2ab1460588671c140bf2126
SHA1 00d228354a22e5c21ade0b1cf4d79e356bffdc9d
SHA256 13114bfba3e895fee6a0b6ab5324485ef39b7640b94dc5372403080b2cf9bb46
SHA512 b39a657b5bc5734ce75993f554d0dbb74171ac420ffdd38a6c16b8cd543723d992ff491be2c57adfd31ffbc1658a601d17d75aadd73c87a71050f2d1f8bddaea

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-18 19:43

Reported

2024-06-18 19:46

Platform

android-x64-arm64-20240611.1-en

Max time kernel

178s

Max time network

186s

Command Line

com.tencent.mm

Signatures

Hook

rat trojan infostealer hook

Makes use of the framework's Accessibility service

collection evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId N/A N/A

Obtains sensitive information copied to the device clipboard

collection credential_access impact
Description Indicator Process Target
Framework service call android.content.IClipboard.addPrimaryClipChangedListener N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Queries the phone number (MSISDN for GSM devices)

discovery

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Reads information about phone network operator.

discovery

Schedules tasks to execute at a specified time

execution persistence
Description Indicator Process Target
Framework service call android.app.job.IJobScheduler.schedule N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.tencent.mm

Network

Country Destination Domain Proto
GB 142.250.187.206:443 tcp
GB 142.250.187.206:443 tcp
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 216.58.204.72:443 ssl.google-analytics.com tcp
NL 91.92.254.104:3434 91.92.254.104 tcp
NL 91.92.254.104:3434 91.92.254.104 tcp
NL 91.92.254.104:3434 91.92.254.104 tcp
NL 91.92.254.104:3434 91.92.254.104 tcp
NL 91.92.254.104:3434 91.92.254.104 tcp
NL 91.92.254.104:3434 91.92.254.104 tcp
NL 91.92.254.104:3434 91.92.254.104 tcp
GB 142.250.179.228:443 tcp
GB 142.250.179.228:443 tcp

Files

/data/user/0/com.tencent.mm/no_backup/androidx.work.workdb-journal

MD5 198c9ada1f84bb6fe1454e10166e4ce0
SHA1 5ab7f05ed8632d3d593eecf42620d50549af241b
SHA256 0858ed585c883a29963fe62fdc3bff6536debe30851b49ee4507c8ac8680eb6f
SHA512 1c02ac624b9b52e6cf574f0453af3e55edf93eea4fecc4196a1b1125b9c31ec13bcc30a09ccbfb13da6be912469eb465243121f90684466f9e9e6f90e83b7061

/data/user/0/com.tencent.mm/no_backup/androidx.work.workdb

MD5 7e858c4054eb00fcddc653a04e5cd1c6
SHA1 2e056bf31a8d78df136f02a62afeeca77f4faccf
SHA256 9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512 d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

/data/user/0/com.tencent.mm/no_backup/androidx.work.workdb-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/user/0/com.tencent.mm/no_backup/androidx.work.workdb-wal

MD5 2e3edf90722e44d90d230a49e0de6212
SHA1 1e679bcc2cc4bc7829c9f3d7339bd1bc0b8ea5b6
SHA256 ef818a79d14613238cbc223a7a2024c55f3c68f7c30cc944849235842c15167d
SHA512 1c8a5968bc43be5ac370b42906b320ad67820945b4d3a36a367abe48f599620abf2078cec22ca0e3fdca9947c536c18cc0d5f388c2dfe620758f5c59e69a68d3

/data/user/0/com.tencent.mm/no_backup/androidx.work.workdb-wal

MD5 b269d6c4fa7c80683302227e82c4558d
SHA1 b4b9b35541363db85cc4f260e6bb216d9ace73a6
SHA256 7899f2a1ce27e687ffa1c6ecb807915b3d559d52543b2b5bf014f22b9743f5f9
SHA512 f2ca7972778a45fec6f0d890787bdfe62e526fbed9fffd61a4fd6d8a917b2f6968668013d0ae4bea92124a47ae3b46b43a29200e614bda0f3c3c5e09e60e675c

/data/user/0/com.tencent.mm/no_backup/androidx.work.workdb-wal

MD5 b96d7cef318bff6be61bd278cc06ffd6
SHA1 fe55f5aaa4eb9f4e604346d00c5ff3913bef9b37
SHA256 34bbfe8ccf2961120d3dc20c7faabdd588e67c458dc3e09d42c3f04bad3da55f
SHA512 e332322a5e71938e67884b9a45161cad09698ec1fc192a949d83bb475c173e2eb453a4677e0605654dbf4fb0b3171d1d21b403a15366f3359697b61c1a17683c

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-18 19:43

Reported

2024-06-18 19:46

Platform

android-x86-arm-20240611.1-en

Max time kernel

42s

Max time network

186s

Command Line

com.tencent.mm

Signatures

Hook

rat trojan infostealer hook

Makes use of the framework's Accessibility service

collection evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Queries the phone number (MSISDN for GSM devices)

discovery

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Reads information about phone network operator.

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Schedules tasks to execute at a specified time

execution persistence
Description Indicator Process Target
Framework service call android.app.job.IJobScheduler.schedule N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.tencent.mm

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
NL 91.92.254.104:3434 91.92.254.104 tcp
NL 91.92.254.104:3434 91.92.254.104 tcp
NL 91.92.254.104:3434 91.92.254.104 tcp
NL 91.92.254.104:3434 91.92.254.104 tcp
GB 216.58.212.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.179.238:443 android.apis.google.com tcp
NL 91.92.254.104:3434 91.92.254.104 tcp
NL 91.92.254.104:3434 91.92.254.104 tcp
NL 91.92.254.104:3434 91.92.254.104 tcp
NL 91.92.254.104:3434 91.92.254.104 tcp
NL 91.92.254.104:3434 91.92.254.104 tcp

Files

/data/data/com.tencent.mm/no_backup/androidx.work.workdb-journal

MD5 4c3bae49ad22a6a29993d4f39c99e8e5
SHA1 e35af3f3018d96e690f1af916602a5692117c30e
SHA256 dbbb4789c55dd7db3335abd1f4d016091b923ddfa3b73b5a186e641c953f29dc
SHA512 c7e18bc03e3253da813e7b5aa738c5b2bf2275865955e06b8ffca04673b86d4d67cbe7397a9bfdc1aedeafe58b67e53aa13749ae6e7e955b37b4db00ba14bfe2

/data/data/com.tencent.mm/no_backup/androidx.work.workdb

MD5 f2b4b0190b9f384ca885f0c8c9b14700
SHA1 934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA256 0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512 ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

/data/data/com.tencent.mm/no_backup/androidx.work.workdb-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/com.tencent.mm/no_backup/androidx.work.workdb-wal

MD5 c145e30b8d6de4057d4c7730e1dae70c
SHA1 59800cc668fc83e1a598d2347475b8d0e8f18b21
SHA256 f49c76cce88ee375db2520f255747b568e2b56eae07bdd63a7b653f5f1c46ed6
SHA512 ab1c3bfb4e4d0b503284a20d8da2933aeb0445352a6e1f35cc01c0eb34f9612acb41824f285ec3b5c6b7faa91fb00cb5724c2cf0cf58332a4f86d74d23feb974

/data/data/com.tencent.mm/no_backup/androidx.work.workdb-wal

MD5 d224cf1dc5c49fb95537e87edc4fba4a
SHA1 776a44978cab638602d928f25b3d6d0b67e0ea84
SHA256 12a65ef1fbb74f8307458fabfef55e2052ca32df2047b21380a41bd9d917a155
SHA512 748c6a97e6c0ea8c3628057bb57669bdbbcfa85ae250dd937006f446258d908d99a70fd6dd7eb1bab8d148e1aaed0e7a78914469d22d3fe8f0ed5a7842fcab15

/data/data/com.tencent.mm/no_backup/androidx.work.workdb-wal

MD5 e7279b3bfb94b3f6cafce94a97bb8956
SHA1 49e164f4536c46ece42596a89376af59e35bdc45
SHA256 cbfda9b3f1c2c7d18a02b170ec6a6a5e9bda1dcf10b6f6340a2baa8036186eae
SHA512 f5104375879609b198587ec8a77a56d09c7d8a6a1228ad3197578e75ef425f26643766a4f2c5e629fd2c24ed4d94f821ea201ffd246e7c8af9d65d662b77127f