Analysis
-
max time kernel
147s -
max time network
157s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
10-09-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
7cf9de0bb33002957d7645ba2c7a4f780ec0937fc21f1471c6b665352a04eec1.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
7cf9de0bb33002957d7645ba2c7a4f780ec0937fc21f1471c6b665352a04eec1.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
7cf9de0bb33002957d7645ba2c7a4f780ec0937fc21f1471c6b665352a04eec1.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
7cf9de0bb33002957d7645ba2c7a4f780ec0937fc21f1471c6b665352a04eec1.apk
-
Size
1.1MB
-
MD5
6b64372da9eb946b68afe29f93988e4d
-
SHA1
c6a22ecd0a29ae96ad795480ec75564c7362b562
-
SHA256
7cf9de0bb33002957d7645ba2c7a4f780ec0937fc21f1471c6b665352a04eec1
-
SHA512
aba562609a6171f8c2b4902989c4528b1df3ee269a1a153171fe5c0601850f19d01cbfd6f7da06f6dea6577f7515f643f161421967d690f7f040b73f4b94afe3
-
SSDEEP
24576:QigmO91v2Ow1G02U9+9+lo/beUjFQXML+VghOjaRZjRqybK:QigmYw1GeWFQXML+VsRZsSK
Malware Config
Extracted
ermac
http://91.92.242.166:3434
Extracted
hook
http://91.92.242.166:3434
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac2 payload 1 IoCs
resource yara_rule behavioral3/files/fstream-1.dat family_ermac2 -
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
pid Process 4508 nrv.yqmmemf.oh -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/nrv.yqmmemf.oh/app_apkprotector_dex/classes-v1.bin 4508 nrv.yqmmemf.oh /data/user/0/nrv.yqmmemf.oh/app_apkprotector_dex/classes-v1.bin 4508 nrv.yqmmemf.oh -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId nrv.yqmmemf.oh Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId nrv.yqmmemf.oh Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText nrv.yqmmemf.oh -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses nrv.yqmmemf.oh -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock nrv.yqmmemf.oh -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground nrv.yqmmemf.oh -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction nrv.yqmmemf.oh android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction nrv.yqmmemf.oh android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction nrv.yqmmemf.oh android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction nrv.yqmmemf.oh -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo nrv.yqmmemf.oh -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone nrv.yqmmemf.oh -
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS nrv.yqmmemf.oh -
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS nrv.yqmmemf.oh -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule nrv.yqmmemf.oh -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal nrv.yqmmemf.oh
Processes
-
nrv.yqmmemf.oh1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests enabling of the accessibility settings.
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4508
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD579a4680b0f4d5270e41b56096949d1c8
SHA100eef360ba587f685e5f0745526031e1d648d4ce
SHA256b90194b0357d4c06a7519897a6f2937e9f0c11b092391a628ed18c30fdf2629c
SHA51241a3d8c7039a060e28431f840c39403cc2fe5ba91800f27c9313f75f686d4dcf341018d1ce26ce0a5f1e234833339ad8a84feb1c6a1e3da2f42419a9797a36b3
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD58930ad5656aa1f0ef39860f93d5c77bc
SHA1c09f9b6b78057dc0be4cc530d5c98953f0a39593
SHA25694a3a396232b7ff10dd0062d478f35f46496cc55757da06e46a95e460ace7ffc
SHA512766fe8433862560001ac6cca7453c4f4171fcd84e979ae673cf5873eb944fe1398b31cf395ab20ee51aa76912f3ba7d3e7b34cb86043dcb7e6ca97c669012c16
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD523594d85052516921ee7f7d5ebfb6ce9
SHA1d9ab57b626b4dad809f1116d6396eb4a0a783561
SHA256f6abd1015d237d55a8938669b4e11c77569783573a538de34194e63c9fcbf92b
SHA512b4532571854b99ad2d06380ba618069fa1ed8898669b9360b7d62c6d0ec47e46f7b175b00de59cf770c1ec72b2c922850728da24d4d39714aa0a10ce2fa9650e
-
Filesize
108KB
MD58e2c5853eb125e01127a956523647d19
SHA1d9cfc6ea7ec2b07beb0a7d665757dabc945c3cbb
SHA256227fd924fd2b9cc44add855e9a2dae48ff464dd5453c70facb6bc6297e6ea696
SHA512799d3dcc692814dd0a3998d07088cf1f8ce455665e242776f1d3fc2a70750e4b0ecab29b1fe0343f45fb1ae764d581b205719e828b06f7f9321c2289a91d9468
-
Filesize
173KB
MD5687cd7c58f8a380cc374e1ddbcfd3d45
SHA13fa7f5e305008a2c4c0f92777e594b1a837a9d32
SHA256d8ce852a403489cf8b4e3c37e3399eb0212d9e18b6468ab526cd321bc5733976
SHA512bddf1f00f85f1f6c902fbb4fe3ff515d9b3cc702080a9d3ae8d1e626926fac16b6a859fd8fd530b7c4b3bd68b6d2838d10528bab8675020986952dc0f86aaee4