Analysis

  • max time kernel
    178s
  • max time network
    152s
  • platform
    android_x64
  • resource
    android-x64-20240624-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system
  • submitted
    09-08-2024 22:13

General

  • Target

    8192c8133604c35c8494ca887b6df177f72bc90a32f4d53ed0d51c4db6ac24c5.apk

  • Size

    1.2MB

  • MD5

    7e1271651e9bc10630abc95c19cc2226

  • SHA1

    b55fa625c10d53bbbe7ca88e5ce6e5aae1b97ce6

  • SHA256

    8192c8133604c35c8494ca887b6df177f72bc90a32f4d53ed0d51c4db6ac24c5

  • SHA512

    d878973ba53cd0b19ab5935cdf38556d9e880706d9c453f2b8173aed93949b87d20d9c128c90a86290890f05164f65a4bb367aa7bfe452e2449006022538f02e

  • SSDEEP

    24576:7/cg/uvb75nkEFqD9jy4YIX5BZ0KxYwQYNZ2j9r5AdXR:og/wJh+9jy4h7ZMUZ6UB

Malware Config

Extracted

Family

ermac

C2

http://auvzmashinadx.xyz ; http://auglogvnja.xyz ; http://audkzmzc.xyz

http://auvzmashinadx.xyz

http://auglogvnja.xyz

http://audkzmzc.xyz

AES_key

Extracted

Family

hook

C2

http://auvzmashinadx.xyz ; http://auglogvnja.xyz ; http://audkzmzc.xyz

http://auvzmashinadx.xyz

http://auglogvnja.xyz

http://audkzmzc.xyz

AES_key

Signatures

  • Ermac

    An Android banking trojan first seen in July 2021.

  • Ermac2 payload 1 IoCs
  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.yezatabefuhe.tozeci
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4936

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.yezatabefuhe.tozeci/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.yezatabefuhe.tozeci/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    c2c5f7a58d9b3c50b0be173cf10abfbd

    SHA1

    d1d8f871c5a520fce49b84013ac3a85c63f66406

    SHA256

    9482959eda9ed887b3410e05ac19c9e65241aa40643ba6f5abbd60bb09487b9c

    SHA512

    0b9ecaa39188fdcda27a049b73d16e3e97c72e242721e8f0266a8df9485eb3f2c2d38e144f0ee5001ed9c5c9e9c3604b9b507c445d68514c68672a41d601a0eb

  • /data/data/com.yezatabefuhe.tozeci/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.yezatabefuhe.tozeci/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    10db206424cd695cc5179c2fb67eb3fe

    SHA1

    4e0d7c8ac9aeae8bab77715001cb4eace316d05c

    SHA256

    84d15ffad62b6e50a7364a504f64ade37a42ef90729cc685b9dc683f4897e78b

    SHA512

    dc8f89004c4f7d15c2b492ad063730e2f0f7c3a78c2403a1ab5ee4578f9f3c879bae3be6fdef4192a1621c4559331f4d0aedf3d49f9a99580d2a36dfe1e38bc7

  • /data/data/com.yezatabefuhe.tozeci/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    6254ac6e6743bf54ca13013b41923809

    SHA1

    4b3acf95cbd76ff39b261b55090514b399d7e03c

    SHA256

    44cad94653c19f99ffdd8d756ec3f3962ae793a8cc6cf5c7f343554558d17392

    SHA512

    75ca67ddf1eb9e061ccd79c443ab1800598d7b00d23765d1ae64d41b1d8aad3b3c938829404e221cbf8392ddef000357c971234b533a1599416d4e78d5068523

  • /data/data/com.yezatabefuhe.tozeci/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    029655a02cfcef119c32676a2bff6bc9

    SHA1

    889fcc911a5dcf1ad80778051d21ca7f5ef80e52

    SHA256

    48453f4a5a413611a942559eb37e6d62f737b17e3198254caa353a9119ec67dd

    SHA512

    694c5b2ceea92ee17bc5fc4e67113c6f6163110653f31dbdfcbb19020fec9d3e2d8c8f1e29df65de0d7cd3a98155c01dcaa6aa6451dc49bd0b596bff57d019ba

  • /storage/emulated/0/Android/obb/com.yezatabefuhe.tozeci/dp/dp-a.a

    Filesize

    1.5MB

    MD5

    52c99cbea7f93afc7af6f8a002173e4a

    SHA1

    81aee4a29a4868a087cefe80df0278f8155afd69

    SHA256

    9fd376afa40abc17c13375e9465b0c7fc24240458dbdaa328ee5111834095f1a

    SHA512

    fa36edc6ce6ec8a54128ad5a654026b3b66c093103f4d2fc806888ff1ca33eb857533c58c8b9bd680f3b6a21dcdcb2e0e076a850c6dbac44b1e97c43e15a9bed