General

  • Target

    788fec0f1d7102e670aea415b942179b420c5df2136abc388680e99c6d4c0262.bin

  • Size

    896KB

  • Sample

    240826-12e8qaxgqa

  • MD5

    96dfc33a1245d5af2fb95f3dc2564de4

  • SHA1

    9efcf5529992a5f513d69bcf73e3c51579f62d0c

  • SHA256

    788fec0f1d7102e670aea415b942179b420c5df2136abc388680e99c6d4c0262

  • SHA512

    5a57a0e4f9b5cf7db8026c669a87f84811ba032f2dc4de557dba50d949755f7acc67c020044df4d831ea7cc57328aaa4d5ef8496340b6ed7b6296d2d08bfb13c

  • SSDEEP

    12288:rEgvBBMXdqS27JXoI1Y+DJdGwB0OD5YRF+uAVqyp3dZ1PXkbAXlgA4qDnL58:rEgwNnM+IG+qwabF+uuzZ1vkb6lg/u58

Malware Config

Extracted

Family

ermac

C2

http://194.59.31.188:3434

AES_key
AES_key

Targets

    • Target

      788fec0f1d7102e670aea415b942179b420c5df2136abc388680e99c6d4c0262.bin

    • Size

      896KB

    • MD5

      96dfc33a1245d5af2fb95f3dc2564de4

    • SHA1

      9efcf5529992a5f513d69bcf73e3c51579f62d0c

    • SHA256

      788fec0f1d7102e670aea415b942179b420c5df2136abc388680e99c6d4c0262

    • SHA512

      5a57a0e4f9b5cf7db8026c669a87f84811ba032f2dc4de557dba50d949755f7acc67c020044df4d831ea7cc57328aaa4d5ef8496340b6ed7b6296d2d08bfb13c

    • SSDEEP

      12288:rEgvBBMXdqS27JXoI1Y+DJdGwB0OD5YRF+uAVqyp3dZ1PXkbAXlgA4qDnL58:rEgwNnM+IG+qwabF+uuzZ1vkb6lg/u58

    • Ermac

      An Android banking trojan first seen in July 2021.

    • Removes its main activity from the application launcher

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks