Analysis

  • max time kernel
    177s
  • max time network
    159s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    19-08-2024 22:01

General

  • Target

    a8b38eff2d4b5d53f031335b6956ec5e318333a5d71b9ba494a80cdd4ec0635b.apk

  • Size

    1.6MB

  • MD5

    9889bf36ea2bfead9f8ad5d55d54d9f8

  • SHA1

    678e78dd62d1dfa2487212246862ad86261a3337

  • SHA256

    a8b38eff2d4b5d53f031335b6956ec5e318333a5d71b9ba494a80cdd4ec0635b

  • SHA512

    f77e7c2c47ff8c5408a91799005c38602a4d2f55badb243f7fd54dd22fec41dbfffcc18e76a68f563ca5d28ddc7edbb966ae96c697f6767ff5fdc68d531839e1

  • SSDEEP

    24576:9g/S2jN3z1Xzej3KFLUC26Wl3fgDtTTXZPLY7YXZ4pCKm57AHQJj7Xcj:9g/VN3z1Xy+LQl4JTjpoYm7mPBI

Malware Config

Extracted

Family

ermac

C2

http://audkzmzc.xyz ; http://auvatkijn.xyz ; http://aukivmansik.xyz ; http://aulalizbxga.xyz ; http://augo3kkvx.xyz ; http://auxzaknjan.xyz

http://audkzmzc.xyz

http://auvatkijn.xyz

http://aukivmansik.xyz

http://aulalizbxga.xyz

http://augo3kkvx.xyz

http://auxzaknjan.xyz

AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key

Extracted

Family

hook

C2

http://audkzmzc.xyz ; http://auvatkijn.xyz ; http://aukivmansik.xyz ; http://aulalizbxga.xyz ; http://augo3kkvx.xyz ; http://auxzaknjan.xyz

http://audkzmzc.xyz

http://auvatkijn.xyz

http://aukivmansik.xyz

http://aulalizbxga.xyz

http://augo3kkvx.xyz

http://auxzaknjan.xyz

AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key
AES_key

Signatures

  • Ermac

    An Android banking trojan first seen in July 2021.

  • Ermac2 payload 1 IoCs
  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 14 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Reads information about phone network operator. 1 TTPs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Tries to add a device administrator. 2 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.ruyulovowivocu.sigi
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Tries to add a device administrator.
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4496

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.ruyulovowivocu.sigi/app_ded/H0xqCD9eb3xUgllpgcBRzm26YsQtKAg7.dex

    Filesize

    1.5MB

    MD5

    cbcb1c6b9d17e0cd1146a7e3843eb1dd

    SHA1

    8f9591f835757b8be2bf5e27f1bed383d5048c68

    SHA256

    d559613e71e7529589d407ee46071fe4c49780c1469f5af4caa024dfb2283154

    SHA512

    a1bb5f52ac26328bba53ce2156129fa44e4bc4f67143d79f25de11f80ba8279aea0403168adbd419823fbb6372f6ea45ad512f97f5ea00e46ab5c53daa2a4df0

  • /data/user/0/com.ruyulovowivocu.sigi/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/user/0/com.ruyulovowivocu.sigi/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    bbb1aaa2e21630ff70a986fea7252e54

    SHA1

    2036b7c8a7c87acff0f0b27792c505ce76e3abe2

    SHA256

    d28fcae8435c3fb9f76d241db0cdf22a5118f2e51f5644782ab8825cda77607f

    SHA512

    a2db508db23d80202e50c3b7fcbdce6a905ab3332384b84846f0bbed062b87f85349321b963437f66420ff70246e742a7bbbab732db7a37f787824b88c0acfdf

  • /data/user/0/com.ruyulovowivocu.sigi/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/user/0/com.ruyulovowivocu.sigi/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    dfb0fe51da680770c312edf37c512cf8

    SHA1

    e727d82d612461ba5a6a2b90f9477ea395a7a577

    SHA256

    b44b4705acd1e6061b862058cb6623e55caecc3ac4153d8151ce99ea67b6b600

    SHA512

    8943bafee41fe87fa004b4755c6138f8846546dda4cd3dd3fc4e60f345a556e6ee1ab48fd44f50f0a911126d724d3154acc6c1d3cf6880cf9792db77d98d5c9d

  • /data/user/0/com.ruyulovowivocu.sigi/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    a90c801063a4c07f15a24b9a212ebf00

    SHA1

    a0f5e00f584866d82bf9e85a3fa3fc2385843ca1

    SHA256

    f8a78ca1c00b9a7b8fd131fa599538c1931767882fcfc27a872ebedab89c15b2

    SHA512

    88a6d104773cacaa46effdc99e8a5fabcc731d13b79220201ef5ad7a5360d774cdcee5248a9f3034261e2a0ed9d728c4db4d6ebd3c3d779e6266253ef9e63030

  • /data/user/0/com.ruyulovowivocu.sigi/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    00bd3d0f1f8fbff64336c0b2e87f49b3

    SHA1

    e62f91cb0ad9e8f2814efabcb8c50cb867fab74b

    SHA256

    87971233b739c21081e83cefbf3bea7f31e201850a6868654f202e6f772f9d7d

    SHA512

    794928d0da74a61da09f8a8a07ea93234ce09c3858a02065ddf1eb968c7d7cbe8ef589945d17aa8dec8535b8a210e0f8792d43192e4dae15dd1b55bb37e9b790