Analysis
-
max time kernel
146s -
max time network
159s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
30-08-2024 22:04
Static task
static1
Behavioral task
behavioral1
Sample
bf3ffeb17088835da1b143a9d5ab3c12beab6343420596d2413b1f3153283329.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
bf3ffeb17088835da1b143a9d5ab3c12beab6343420596d2413b1f3153283329.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
bf3ffeb17088835da1b143a9d5ab3c12beab6343420596d2413b1f3153283329.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
bf3ffeb17088835da1b143a9d5ab3c12beab6343420596d2413b1f3153283329.apk
-
Size
3.8MB
-
MD5
835fd67ff29ceffd40e69cec1a9387a0
-
SHA1
6ef78912b3e0b4d4fe5262191313a70a09cd13f9
-
SHA256
bf3ffeb17088835da1b143a9d5ab3c12beab6343420596d2413b1f3153283329
-
SHA512
be990e536fb163061a4e8c2ccc2dd28a7f32b33a06ad8d109b8f65d3a8359c0e9e22b48dfd438464662224608e08832c20cae664269e20c731df63cdaef18dc3
-
SSDEEP
98304:MRr6FQVSCyhyqbZ4kpV1B1qmZcA8YS95ZAMw4Wxuoa+719YGssi:MyCSCyMqbZ4mV1X76f95ZS4WEUjRssi
Malware Config
Extracted
ermac
http://91.92.255.65:3434
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac2 payload 1 IoCs
resource yara_rule behavioral3/files/fstream-3.dat family_ermac2 -
pid Process 4491 com.ueonkgnhp.gicztgizn -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.ueonkgnhp.gicztgizn/app_dex/classes.dex 4491 com.ueonkgnhp.gicztgizn /data/user/0/com.ueonkgnhp.gicztgizn/app_dex/classes.dex 4491 com.ueonkgnhp.gicztgizn -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.ueonkgnhp.gicztgizn Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.ueonkgnhp.gicztgizn Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.ueonkgnhp.gicztgizn -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.ueonkgnhp.gicztgizn -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.ueonkgnhp.gicztgizn -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.ueonkgnhp.gicztgizn -
Performs UI accessibility actions on behalf of the user 1 TTPs 11 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ueonkgnhp.gicztgizn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ueonkgnhp.gicztgizn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ueonkgnhp.gicztgizn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ueonkgnhp.gicztgizn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ueonkgnhp.gicztgizn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ueonkgnhp.gicztgizn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ueonkgnhp.gicztgizn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ueonkgnhp.gicztgizn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ueonkgnhp.gicztgizn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ueonkgnhp.gicztgizn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ueonkgnhp.gicztgizn -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.ueonkgnhp.gicztgizn -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.ueonkgnhp.gicztgizn -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.ueonkgnhp.gicztgizn -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.ueonkgnhp.gicztgizn -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.ueonkgnhp.gicztgizn
Processes
-
com.ueonkgnhp.gicztgizn1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4491
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
942KB
MD5b7a63af6e3c017d27832376d90c10b66
SHA18f9f938c33c99c3ad1b3d65285ebd921b1e84322
SHA25686eda2ac571ab87788d8730419fea24962549d211b1ef3e4130affdc1f5d84b8
SHA5126f4c4cd636f7d50178356dff1a3004b52180709cb68ca05e1d6c3ef3448735c1f1dab4e1f062529407a06de07e3212e51f561f75be91412a94e78930f0726794
-
Filesize
455KB
MD58ca85e1253b6a3ab98c04a5e4d447cc0
SHA1620be83840be9b585afad290e1ee66f7f706c107
SHA25651214d5b0f78e20fa0ed2652be0823b4750c9a39b07d46d79296a25ebc946fff
SHA512b258f441089aba453f9c102265400d30a53e38ba8b82ad131e7f1626a62783836e34154b9cbe17d509cc74a461a76fe2c3fbffa15e8780dd7e8f5e4b57a2eaa9
-
Filesize
456KB
MD525a2e3d558b429d673ba369fe74042b8
SHA137570dd23f266f54a28184b35489e1fe0cc714db
SHA25659b9bc6a0432c7b85e13490f5b66e2bfde31437a11dd891dbaaf1733e65726cd
SHA512cb6d6814534b2afba5c6ccab239c0cf84311a731f7596129720de03f2642490b6b0941a882cce7c55324a0217dcf5f0f69acbbf17f377dfe65e65ec4735e735e