Analysis
-
max time kernel
179s -
max time network
187s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
25-08-2024 22:04
Static task
static1
Behavioral task
behavioral1
Sample
38b4a1541bc752957860d971a8a0947eddfc253bafd2304511866638aeab2fcd.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
38b4a1541bc752957860d971a8a0947eddfc253bafd2304511866638aeab2fcd.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
38b4a1541bc752957860d971a8a0947eddfc253bafd2304511866638aeab2fcd.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
38b4a1541bc752957860d971a8a0947eddfc253bafd2304511866638aeab2fcd.apk
-
Size
2.8MB
-
MD5
f8e3c435984479f11ff3d01339ffd608
-
SHA1
c35db3eb25583f15830b543b519f35be61d8fe1a
-
SHA256
38b4a1541bc752957860d971a8a0947eddfc253bafd2304511866638aeab2fcd
-
SHA512
34ad04829b6f6e9d7a7538f0c264c323263b44b7566b70d5998cb8a85c0d62a9652f25f4e0fa9661004a9b0588fcde5d1c3e5a021e1c3867d13042736e0c987f
-
SSDEEP
49152:D69/+HgoyVlWIQteqHaSJBcema0O0b5zI/tZKxZYrcuG7oC9PbteC9gWhZdGcqQ:mmuArYWtZKx6YuGDjeMZZj
Malware Config
Extracted
ermac
http://4.233.219.149:3434
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac2 payload 1 IoCs
resource yara_rule behavioral3/memory/4510-0.dex family_ermac2 -
pid Process 4510 com.bukoxajisace.buke -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.bukoxajisace.buke/app_decide/lba.json 4510 com.bukoxajisace.buke -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.bukoxajisace.buke Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.bukoxajisace.buke Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.bukoxajisace.buke -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.bukoxajisace.buke -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.bukoxajisace.buke -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bukoxajisace.buke android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bukoxajisace.buke android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bukoxajisace.buke android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bukoxajisace.buke android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bukoxajisace.buke -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.bukoxajisace.buke -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.bukoxajisace.buke -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.bukoxajisace.buke
Processes
-
com.bukoxajisace.buke1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
PID:4510
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
480KB
MD57fdcc41e6d3bd504639babd0b4e916eb
SHA1b571cb676b07026060d140084a9043245b2c17b2
SHA256bd0143962566800b7639ee328d17fde77adedc65130880c4276c144b710161ff
SHA51299b115053ba5ed9ad0c66255763689720384cf8807479debd2e39d32fb90d2ab58f1492c18339235d603db6402091a8210a1912f26e8d9e070a2f3c93216e8ef
-
Filesize
480KB
MD502c384223ea5750fb12b88337d79026a
SHA109d27626ad60c9f07cef791e262667683d32c84f
SHA256828b8cc0cba610bf28ee0fad82f47f77cd30a633389c8d338368a6d824e626e3
SHA512e1779e93e72b3e2de59198703dbdf6d10316eae43bf1557883f2cc6cf1d33ab7e3aeea16a015c3a74aaac0eb6aa5fbecc2b4a6407eec15e0c4967317ae6859e4
-
Filesize
501B
MD53e3b57d8ed9a32b2912b45fb53ab7e56
SHA1fe4959514afcca974e1971f2e9232bb41b5b5d79
SHA256fd3db546ed98c301cc73544900e7cd765210aa0510bff89911cd94ee418b4faa
SHA5128bc14632677e290b372bfbc937b9c71c4f8a116ead654ccdea5c77efe53eadc9ea3c8926de85b81f126d27b689234d8dd7237fec484381bc487c77a83a9702d6
-
Filesize
999KB
MD5dd9fc0a20f622b01629610fcef4d70d4
SHA15dc502b34b09c5470cd0bf5cab85fc8e5ff53553
SHA256c0366b51dd5fb3d71fa323bce84206674f557e5b68c3bedb578bfa7816f62531
SHA512d704ca7125c0a3e8946f6863f2fe1a982e2328563ba19072308710279cea430cf83261f459f9214fc57f11aec7368dc571eb7a68db65c12594ae29c7f1e5ad31