Analysis

  • max time kernel
    177s
  • max time network
    171s
  • platform
    android_x64
  • resource
    android-x64-20240624-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system
  • submitted
    19-08-2024 22:01

General

  • Target

    a8b38eff2d4b5d53f031335b6956ec5e318333a5d71b9ba494a80cdd4ec0635b.apk

  • Size

    1.6MB

  • MD5

    9889bf36ea2bfead9f8ad5d55d54d9f8

  • SHA1

    678e78dd62d1dfa2487212246862ad86261a3337

  • SHA256

    a8b38eff2d4b5d53f031335b6956ec5e318333a5d71b9ba494a80cdd4ec0635b

  • SHA512

    f77e7c2c47ff8c5408a91799005c38602a4d2f55badb243f7fd54dd22fec41dbfffcc18e76a68f563ca5d28ddc7edbb966ae96c697f6767ff5fdc68d531839e1

  • SSDEEP

    24576:9g/S2jN3z1Xzej3KFLUC26Wl3fgDtTTXZPLY7YXZ4pCKm57AHQJj7Xcj:9g/VN3z1Xy+LQl4JTjpoYm7mPBI

Malware Config

Extracted

Family

ermac

C2

http://audkzmzc.xyz ; http://auvatkijn.xyz ; http://aukivmansik.xyz ; http://aulalizbxga.xyz ; http://augo3kkvx.xyz ; http://auxzaknjan.xyz

http://audkzmzc.xyz

http://auvatkijn.xyz

http://aukivmansik.xyz

http://aulalizbxga.xyz

http://augo3kkvx.xyz

http://auxzaknjan.xyz

AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key

Extracted

Family

hook

C2

http://audkzmzc.xyz ; http://auvatkijn.xyz ; http://aukivmansik.xyz ; http://aulalizbxga.xyz ; http://augo3kkvx.xyz ; http://auxzaknjan.xyz

http://audkzmzc.xyz

http://auvatkijn.xyz

http://aukivmansik.xyz

http://aulalizbxga.xyz

http://augo3kkvx.xyz

http://auxzaknjan.xyz

AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key

Signatures

  • Ermac

    An Android banking trojan first seen in July 2021.

  • Ermac2 payload 1 IoCs
  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.ruyulovowivocu.sigi
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:5117

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.ruyulovowivocu.sigi/app_ded/0VDDxwHTw3YuiQKFYVHX3R5JbCYn13GA.dex

    Filesize

    1.5MB

    MD5

    cbcb1c6b9d17e0cd1146a7e3843eb1dd

    SHA1

    8f9591f835757b8be2bf5e27f1bed383d5048c68

    SHA256

    d559613e71e7529589d407ee46071fe4c49780c1469f5af4caa024dfb2283154

    SHA512

    a1bb5f52ac26328bba53ce2156129fa44e4bc4f67143d79f25de11f80ba8279aea0403168adbd419823fbb6372f6ea45ad512f97f5ea00e46ab5c53daa2a4df0

  • /data/data/com.ruyulovowivocu.sigi/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.ruyulovowivocu.sigi/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    f275a70433d7287470a158337692505b

    SHA1

    b1df6eafc58fc827c7fa5b9a238f132220a946f7

    SHA256

    64103562c8a8182f4784f9e8a64c864a08594c79485767d5dc270a722c0c1f43

    SHA512

    39ba20c8701686c200c04ff353dfabd6b6fc62ace367d23783c2bb4238470671a76c2f11d791318cfd9b93c9735da86fb89626c9d4c5abf56460817e113e7959

  • /data/data/com.ruyulovowivocu.sigi/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.ruyulovowivocu.sigi/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    4156b03d7852a22286035d40f7a16349

    SHA1

    a54e659ef66fd9654ac9be996c0b9de2f7b07b0e

    SHA256

    0d2a4224bd6f5dbe1d5c60a1b4d196786346c909cd98cd3f232dab968f802c56

    SHA512

    4172b49ac8889619a5509240ed692d42ceb3383723173026c59952d1a2f263f15ccf91c33d17a815ee54a078cf1736491aab80bd8dc31dd687029dfa57a11330

  • /data/data/com.ruyulovowivocu.sigi/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    7e3378139dd0fb11010528d445e46046

    SHA1

    4295b781d045dadf272b8ea3028d6d3ba728e58a

    SHA256

    f8d15f0547efca1edc9b5a6bc6c1ddf7c461f1494bb51c2a99fe9d4ca3d4328f

    SHA512

    bcf95bf6c881a5ca62647ca0735cf468546c4fe64d7d1fbffe93fa05d58c76ea1b1f752e8f0021dc46c1e681cb5e268a55d8a9c3c57e552f54c1687cbc54ab45

  • /data/data/com.ruyulovowivocu.sigi/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    9e0dcd43ebe9b82b8ef0cecea0e4fdd1

    SHA1

    cfef314e0a0b18cf1c460d9b6634bfcf9125bb0d

    SHA256

    60d9f42fae1af2ac6bc849fc3260ce6e3132564090510c0de037763d89da0f06

    SHA512

    49471a107de276cbb07f7f2f618310312ee198f1337269c9ba0a0693aec32564ddf24a1f591cdb20f3e6242bd29a295181a950ed3f615846fb1d988bca7d8d83