Analysis
-
max time kernel
64s -
max time network
186s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
02-08-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
7933686711fc3680b5f862a3502b305222fa1f35b0a8c0ebae4d9e2eef3c584c.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
7933686711fc3680b5f862a3502b305222fa1f35b0a8c0ebae4d9e2eef3c584c.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
7933686711fc3680b5f862a3502b305222fa1f35b0a8c0ebae4d9e2eef3c584c.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
7933686711fc3680b5f862a3502b305222fa1f35b0a8c0ebae4d9e2eef3c584c.apk
-
Size
2.5MB
-
MD5
a569a01fc6f8d426236187b2314aa3f9
-
SHA1
4f33c0004ea889f8a55647c75b0132c05e00d22f
-
SHA256
7933686711fc3680b5f862a3502b305222fa1f35b0a8c0ebae4d9e2eef3c584c
-
SHA512
f0bc892c71382d42953a754d7542488c70e02238b8f46eb77ee7a1fb0f4033c5d928f10b64e0a92f9a61abfddda71c0962d289f150e243cfa32c817742396abf
-
SSDEEP
49152:aayZAxBUKQ42Y3B+pB6qgSh93WaosfKGn+AoT/jVyHL44dT2P:aayePUKQ4/ApBT9GGf5ncjVOk4da
Malware Config
Extracted
ermac
http://45.66.231.11:3434
Extracted
hook
http://45.66.231.11:3434
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac2 payload 1 IoCs
resource yara_rule behavioral2/memory/5074-0.dex family_ermac2 -
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.kakao.talk/app_habit/eM.json 5074 com.kakao.talk -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.kakao.talk Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.kakao.talk Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.kakao.talk -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.kakao.talk -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.kakao.talk -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.kakao.talk -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.kakao.talk -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.kakao.talk -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.kakao.talk -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.kakao.talk -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.kakao.talk -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.kakao.talk -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.kakao.talk -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.kakao.talk
Processes
-
com.kakao.talk1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:5074
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
799KB
MD52566ed2a38c03e21f875354c60f3be6e
SHA195da10d4c7ee44aaa7ac367ffbbc6463a1477e92
SHA2569eab0b7ba737de42c39b68adb86e653f2e42cb417f5221426860133e33c2bc2b
SHA512b9c61b12ca8ac88a7d53246453acaf70c7314e13f49f1d0636cda46662fa4fd54c915a0a8fa99b8c6c6a913cf60cf6edaf94e44a7cf160f30a3e3932cc5b24f6
-
Filesize
799KB
MD51e00e7edcd838a5a700f183559e12dec
SHA1ac4baca009cf61dc812b3205c17c081d5e25cccc
SHA256d339cbd7d1bd47914858be08e624780b267eb5187b48700a6841dd634492712c
SHA512034eeb96caab8c98f993bce721e73f985e43df8b902117b8938e16d9e4c67cb3cd6c413d94529fd3e63e49a1c807383f44da89dc59c67b5e21543897a3ef97ae
-
Filesize
2KB
MD5eaf5c2e257390169c9bceefd3c09da6d
SHA101652af2e5d94651df9692552350e699046c1018
SHA256c5a1626f87131a35f9fe07446f3e2e6b8796e97eaa71e68c12975a94f7b206a1
SHA512959963d4046c2e693ea21dc4bc9ab4b90dcb6b9b8c2d2a74212b7d2f6520e432787aea742194dc2677db6ad8f9a861505419a2b72e1eb0a4eccf850800b50e74
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5a852efd08432a8f53f9f1b4241f0dc56
SHA195452cfb1cde4e8d9e42ff57706100d3a215a51f
SHA256771b4f462e39853ff60602eb89b8105b4e534bf3be16b3b06c9b7f8ec838f989
SHA512fa481adccaf238565576df9d3a076567d28542803e7403039999bf032ef1f298db8aab840b97ee337e8f240bf0b1ec77eaaff3ca210b503cbd6faf80d07bf29a
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD530fac8b0dde3cfcbb8775baf95022be1
SHA1bf5cc3ba5bbf557cd044812382ce719ab0b39854
SHA256ee466051b9e33e33352a245d62b8dd5e1135bf149880112fb7f6c6392665ea37
SHA5128cacc5def2325e89bf22ba413f6eaca074294b403800ed56ad586559428401f7d30abf606962a709517f22ce7ad98f74afb36d008ccf760d5d71182f470b2989
-
Filesize
108KB
MD50fe3295b825fc8f10933d669f856b998
SHA1e0a87af8f70070d227175a53aebf0e0edea7363e
SHA25681021d2e946a40d92618cdca4bf7b4e816488afd789fbf4c8d55f4ab1472f4f0
SHA51260dedf6eae20d0349e546d2dfcd1f9e484709c1a6808827783991ef303945e97a57b4557509098127645d80ae8cdd57df83e0bcf9b82408fef95a810c1eb8a7f
-
Filesize
173KB
MD5ac5e592ef13a78fbb8413af7b92bfd4a
SHA14a5b670c1d8ae13341564d5633fa008edb36f98c
SHA25676f6eae087fbe76f49127c9c6b34237ae137d9369b9b8450e18f0bff0c5d3605
SHA5126304f5a2faade38af223baa4f7ac25319167d33fe2a4731daa9e831d30409322e3ea7608bb50f7ec0332ac9409381ea04dc9078caa51f41d50c0a0bfe0179912
-
Filesize
1.6MB
MD52d2dfb668a71da2c6bf0067e53da9d49
SHA14f50d92424d052c3fbe9ddec343d19bfe59a8ba8
SHA256dd3d706fb16260c8d735bafb6f05a84ad4d9f1ae2632d7625a648327f189de42
SHA512771d307de6164cc25088b603ef5281fc3375ebc5d31aa3bf6a6bdc7d3e18bca8c54dc6c4f935eef8b1c3623a21c08d6951e62e027fbb8795559819eecaebc48d