Analysis
-
max time kernel
147s -
max time network
159s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
30-08-2024 22:04
Static task
static1
Behavioral task
behavioral1
Sample
bf3ffeb17088835da1b143a9d5ab3c12beab6343420596d2413b1f3153283329.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
bf3ffeb17088835da1b143a9d5ab3c12beab6343420596d2413b1f3153283329.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
bf3ffeb17088835da1b143a9d5ab3c12beab6343420596d2413b1f3153283329.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
bf3ffeb17088835da1b143a9d5ab3c12beab6343420596d2413b1f3153283329.apk
-
Size
3.8MB
-
MD5
835fd67ff29ceffd40e69cec1a9387a0
-
SHA1
6ef78912b3e0b4d4fe5262191313a70a09cd13f9
-
SHA256
bf3ffeb17088835da1b143a9d5ab3c12beab6343420596d2413b1f3153283329
-
SHA512
be990e536fb163061a4e8c2ccc2dd28a7f32b33a06ad8d109b8f65d3a8359c0e9e22b48dfd438464662224608e08832c20cae664269e20c731df63cdaef18dc3
-
SSDEEP
98304:MRr6FQVSCyhyqbZ4kpV1B1qmZcA8YS95ZAMw4Wxuoa+719YGssi:MyCSCyMqbZ4mV1X76f95ZS4WEUjRssi
Malware Config
Extracted
ermac
http://91.92.255.65:3434
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac2 payload 2 IoCs
resource yara_rule behavioral1/files/fstream-3.dat family_ermac2 behavioral1/memory/4263-1.dex family_ermac2 -
pid Process 4263 com.ueonkgnhp.gicztgizn -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.ueonkgnhp.gicztgizn/app_dex/classes.dex 4263 com.ueonkgnhp.gicztgizn /data/user/0/com.ueonkgnhp.gicztgizn/app_dex/classes.dex 4288 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ueonkgnhp.gicztgizn/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.ueonkgnhp.gicztgizn/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.ueonkgnhp.gicztgizn/app_dex/classes.dex 4263 com.ueonkgnhp.gicztgizn -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.ueonkgnhp.gicztgizn Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.ueonkgnhp.gicztgizn Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.ueonkgnhp.gicztgizn -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.ueonkgnhp.gicztgizn -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.ueonkgnhp.gicztgizn -
Performs UI accessibility actions on behalf of the user 1 TTPs 13 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ueonkgnhp.gicztgizn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ueonkgnhp.gicztgizn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ueonkgnhp.gicztgizn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ueonkgnhp.gicztgizn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ueonkgnhp.gicztgizn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ueonkgnhp.gicztgizn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ueonkgnhp.gicztgizn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ueonkgnhp.gicztgizn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ueonkgnhp.gicztgizn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ueonkgnhp.gicztgizn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ueonkgnhp.gicztgizn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ueonkgnhp.gicztgizn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ueonkgnhp.gicztgizn -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.ueonkgnhp.gicztgizn -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.ueonkgnhp.gicztgizn -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.ueonkgnhp.gicztgizn -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.ueonkgnhp.gicztgizn -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.ueonkgnhp.gicztgizn -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.ueonkgnhp.gicztgizn
Processes
-
com.ueonkgnhp.gicztgizn1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4263 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ueonkgnhp.gicztgizn/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.ueonkgnhp.gicztgizn/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4288
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
942KB
MD5b7a63af6e3c017d27832376d90c10b66
SHA18f9f938c33c99c3ad1b3d65285ebd921b1e84322
SHA25686eda2ac571ab87788d8730419fea24962549d211b1ef3e4130affdc1f5d84b8
SHA5126f4c4cd636f7d50178356dff1a3004b52180709cb68ca05e1d6c3ef3448735c1f1dab4e1f062529407a06de07e3212e51f561f75be91412a94e78930f0726794
-
Filesize
455KB
MD58ca85e1253b6a3ab98c04a5e4d447cc0
SHA1620be83840be9b585afad290e1ee66f7f706c107
SHA25651214d5b0f78e20fa0ed2652be0823b4750c9a39b07d46d79296a25ebc946fff
SHA512b258f441089aba453f9c102265400d30a53e38ba8b82ad131e7f1626a62783836e34154b9cbe17d509cc74a461a76fe2c3fbffa15e8780dd7e8f5e4b57a2eaa9
-
Filesize
456KB
MD525a2e3d558b429d673ba369fe74042b8
SHA137570dd23f266f54a28184b35489e1fe0cc714db
SHA25659b9bc6a0432c7b85e13490f5b66e2bfde31437a11dd891dbaaf1733e65726cd
SHA512cb6d6814534b2afba5c6ccab239c0cf84311a731f7596129720de03f2642490b6b0941a882cce7c55324a0217dcf5f0f69acbbf17f377dfe65e65ec4735e735e
-
Filesize
942KB
MD577b84684e63851f40629f7495fcfe73d
SHA1ed2b10768eca8f7d69cfb21a6e6b11a437997465
SHA256ff35cdd5e7ca4532ea152fda8172d9c5f1977ea34a95ae844b708702ec3a7796
SHA5121d6fe7044ba2db566310acf5829fd4f5deea8f1bcaf2b70d397b7ef1db80003be4a8e6fdc9128911b6784aa61c84d1480269da22c6a416bb72eabd2814a19787