Analysis
-
max time kernel
172s -
max time network
184s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
29-08-2024 08:39
Static task
static1
Behavioral task
behavioral1
Sample
ermac_72b3.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
ermac_72b3.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
ermac_72b3.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
ermac_72b3.apk
-
Size
2.8MB
-
MD5
72b3faff0779e1ddaef3a317fbefa29c
-
SHA1
6af79ef669a9250ae2599348f103f772817c88a2
-
SHA256
4ccf02c87de6c0bf718d9f8cdf6c61a9edc909fab1cdd7d497572e30fea1f580
-
SHA512
6a288603b55685d7ce6573ed632f3497f339e7e71e405c9d1fb8dee11a58731bcbbcc137ac3320ee4e88055ee285a5a870f3ebc8258f101bcd83de19ce9543d6
-
SSDEEP
49152:O7MG0EqP3bAU5vB4f/VBiEZEuAI12iQ24Xnviujng53+mmaIHYu6O+c9:+MHP3bvBmBZZEfIAiQ2ebjnUOZ+g
Malware Config
Extracted
ermac
http://193.106.191.116:3434
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac2 payload 2 IoCs
resource yara_rule behavioral1/memory/4285-0.dex family_ermac2 behavioral1/memory/4259-0.dex family_ermac2 -
pid Process 4259 com.heruhifosexowe.piwi 4259 com.heruhifosexowe.piwi 4259 com.heruhifosexowe.piwi -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.heruhifosexowe.piwi/app_DynamicOptDex/wZTAb.json 4285 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.heruhifosexowe.piwi/app_DynamicOptDex/wZTAb.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.heruhifosexowe.piwi/app_DynamicOptDex/oat/x86/wZTAb.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.heruhifosexowe.piwi/app_DynamicOptDex/wZTAb.json 4259 com.heruhifosexowe.piwi -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.heruhifosexowe.piwi Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.heruhifosexowe.piwi Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.heruhifosexowe.piwi -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.heruhifosexowe.piwi -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.heruhifosexowe.piwi -
Performs UI accessibility actions on behalf of the user 1 TTPs 23 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.heruhifosexowe.piwi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.heruhifosexowe.piwi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.heruhifosexowe.piwi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.heruhifosexowe.piwi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.heruhifosexowe.piwi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.heruhifosexowe.piwi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.heruhifosexowe.piwi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.heruhifosexowe.piwi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.heruhifosexowe.piwi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.heruhifosexowe.piwi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.heruhifosexowe.piwi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.heruhifosexowe.piwi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.heruhifosexowe.piwi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.heruhifosexowe.piwi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.heruhifosexowe.piwi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.heruhifosexowe.piwi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.heruhifosexowe.piwi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.heruhifosexowe.piwi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.heruhifosexowe.piwi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.heruhifosexowe.piwi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.heruhifosexowe.piwi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.heruhifosexowe.piwi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.heruhifosexowe.piwi -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.heruhifosexowe.piwi -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.heruhifosexowe.piwi -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.heruhifosexowe.piwi
Processes
-
com.heruhifosexowe.piwi1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
PID:4259 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.heruhifosexowe.piwi/app_DynamicOptDex/wZTAb.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.heruhifosexowe.piwi/app_DynamicOptDex/oat/x86/wZTAb.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4285
-
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
751B
MD5c7eae45a3ffc0980ac7aa6c6543f586b
SHA1e80cf0db6c94a3e96cb262f910dda54016ce168e
SHA2565b24c70932472726ebf2776cfbd7157be9fc340879f18624e1e4ae4e6f45a4b0
SHA5127f57a201d511b1caed8702dd604a5fb2a7201fe9d569c30e1e3e84d2c73f3d96ee0356cb5e37d1cc3eedd0fa40a45f75ac0e2dee43bb4c9344cc054f67764c6a
-
Filesize
456KB
MD5745780b4c7bd7ffb3e12e203f8cada52
SHA14615d1372289c0468d2c86e07bbe7e914b45d68b
SHA25656ae1eaab2a1c9e135d908490c2c2f8c2ad11073bd433bef70c25729bfec7b07
SHA512e60a8769b2782a62acf6cb114778af9b5a21a119c11e8323b5556b6b2834d65690a98e0ebb35f6b9890310168a06104606688f17b5297fe149477cc6efc43903
-
Filesize
456KB
MD56c28fcb0ec6aed2118c452622ebd6a1e
SHA16b6242cdd83d76f415ccc62d46b29ddd70dfef70
SHA25670c6aa458d1a1dfbb35c77846b67854eb515a5eae80a113450e093e351cd8f92
SHA512507a1b4f0fd6e651caade1acfd4bfdf8baf67d77b70194896bd118975283ec26f7b55a02a8dd9db01e34d8d33b3aca646c111822a205050f4c60673294efa97a
-
Filesize
899KB
MD52154c0200a1b41af07ed73e975e26a55
SHA139e0f57e32dcd35b565950fffb090abe18a82a2a
SHA256b5c6a065735badcf3ce3a8a9aa1508d7a1164eb31474ae32110c4ad0d89dc4c9
SHA5124d831227e88a2ef9f7540a67769a1cd9a638625c947f2ccb20736cfede5f5a43df5b3e061ae3c55090f6ae96525395256cdda7dbdd9656320f278a63e820d620
-
Filesize
899KB
MD54705b243f88e10b75353e79019cc3c3c
SHA1d4560eafa95c42228f29f049202a4ce1a1225f99
SHA256875e2d19b70c266d04fff7b9c47947af697aeea1d115f14bc0d79b54d4034026
SHA512a568e2aa5457a58d97a8720c3a15c5fe7176a7f3e6d16435041bf48733209012882a60d782dfb42a7f92dcb9b4e818f601acbca08d9cc3a76089ad3df331a36b