Analysis
-
max time kernel
149s -
max time network
156s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
10-09-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
7cf9de0bb33002957d7645ba2c7a4f780ec0937fc21f1471c6b665352a04eec1.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
7cf9de0bb33002957d7645ba2c7a4f780ec0937fc21f1471c6b665352a04eec1.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
7cf9de0bb33002957d7645ba2c7a4f780ec0937fc21f1471c6b665352a04eec1.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
7cf9de0bb33002957d7645ba2c7a4f780ec0937fc21f1471c6b665352a04eec1.apk
-
Size
1.1MB
-
MD5
6b64372da9eb946b68afe29f93988e4d
-
SHA1
c6a22ecd0a29ae96ad795480ec75564c7362b562
-
SHA256
7cf9de0bb33002957d7645ba2c7a4f780ec0937fc21f1471c6b665352a04eec1
-
SHA512
aba562609a6171f8c2b4902989c4528b1df3ee269a1a153171fe5c0601850f19d01cbfd6f7da06f6dea6577f7515f643f161421967d690f7f040b73f4b94afe3
-
SSDEEP
24576:QigmO91v2Ow1G02U9+9+lo/beUjFQXML+VghOjaRZjRqybK:QigmYw1GeWFQXML+VsRZsSK
Malware Config
Extracted
ermac
http://91.92.242.166:3434
Extracted
hook
http://91.92.242.166:3434
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac2 payload 2 IoCs
resource yara_rule behavioral1/files/fstream-1.dat family_ermac2 behavioral1/memory/4317-1.dex family_ermac2 -
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
pid Process 4317 nrv.yqmmemf.oh -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/nrv.yqmmemf.oh/app_apkprotector_dex/classes-v1.bin 4317 nrv.yqmmemf.oh /data/user/0/nrv.yqmmemf.oh/app_apkprotector_dex/classes-v1.bin 4343 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/nrv.yqmmemf.oh/app_apkprotector_dex/classes-v1.bin --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/nrv.yqmmemf.oh/app_apkprotector_dex/oat/x86/classes-v1.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/nrv.yqmmemf.oh/app_apkprotector_dex/classes-v1.bin 4317 nrv.yqmmemf.oh -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId nrv.yqmmemf.oh Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText nrv.yqmmemf.oh Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId nrv.yqmmemf.oh -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses nrv.yqmmemf.oh -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock nrv.yqmmemf.oh -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground nrv.yqmmemf.oh -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction nrv.yqmmemf.oh android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction nrv.yqmmemf.oh android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction nrv.yqmmemf.oh android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction nrv.yqmmemf.oh -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo nrv.yqmmemf.oh -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone nrv.yqmmemf.oh -
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS nrv.yqmmemf.oh -
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS nrv.yqmmemf.oh -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver nrv.yqmmemf.oh -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule nrv.yqmmemf.oh -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal nrv.yqmmemf.oh
Processes
-
nrv.yqmmemf.oh1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests enabling of the accessibility settings.
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4317 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/nrv.yqmmemf.oh/app_apkprotector_dex/classes-v1.bin --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/nrv.yqmmemf.oh/app_apkprotector_dex/oat/x86/classes-v1.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4343
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD579a4680b0f4d5270e41b56096949d1c8
SHA100eef360ba587f685e5f0745526031e1d648d4ce
SHA256b90194b0357d4c06a7519897a6f2937e9f0c11b092391a628ed18c30fdf2629c
SHA51241a3d8c7039a060e28431f840c39403cc2fe5ba91800f27c9313f75f686d4dcf341018d1ce26ce0a5f1e234833339ad8a84feb1c6a1e3da2f42419a9797a36b3
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD52134448c5b5329040925cc4cebe65052
SHA17602ff92f972b9bb0aaba54aca99562eda069fcd
SHA256efb34d886c4b980820c656626b25bb6dfea8d8af25941a13aabf03adfdc936b7
SHA512d34dacf5e3ab002784181d8a90ed87f7dcaf5ad32a51f588ab9c5bb2ab92dc54d00af1801967bdeb8ed91704d851ee5969b8ecfcd678c188c1a1075242a62d29
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
173KB
MD533ecd36c72e2aa7b5c083174a0225629
SHA171b2d3071ba911c46839712e2085b0f1d15eadb8
SHA25658a01a84c8615867863e7135dff3bdf4da50ae06f51f28c40ef25c7aca44381e
SHA512211bb6927acf7e87ef28fa6f327aaa04e251f4a1ab993058eb3325cad82cc981759f4d123cf0f8a553e010ad63fc10e033d7f69cb34903e94566999589ce73a9
-
Filesize
16KB
MD5a086fd41117a51652f30b2198c781589
SHA1146479ddd80fd9375fd8ae412ef84eb32b4c7801
SHA256732cd03dd7a5eede8a9f6ba3192f4e12a4714519a51387175f7ff1fb24ddc97f
SHA512f0fa747e90aa58eec3da434267c48442ef92e5b2cadb9af7f21cb30fbbf3a13ce3a8f072a6cf8c285487e23b291a2ec3d115120e13f7ba6e951e3bf5fc39ac68
-
Filesize
108KB
MD5ba4481b57a77c667d44a5d8aae104e92
SHA16251ce5a5ed135863c6f5dc443f0307c72fb6b5e
SHA256bbebbea4f468dd8b03c332a1e2d60f431dfac51d40521f51f01dc69da46c18d5
SHA512a60b7f322fe6b77929c9ed6595f5eb95203227b4caecdda5b2506ba8696274f9328cb9282c251249736ababb1de4c52d65e7d704ee1b88a279c6e0e196898b91
-
Filesize
1.5MB
MD5758fd177e85459423e1e58ff011d0f7f
SHA15e7a218f9124f8c2953ca6aa07ad89849654bb8a
SHA256f2c52ede4aa12c2065909fa62d117a5d099455674013b7886b2b060693a91470
SHA512d242a54f731dd28da1be7e3611db5c92d54f02aa87441dc875867de0ad2fce22595337973c04c58f05ca72a4fca1fed26f6597119089a064383f3441f682513e