Analysis

  • max time kernel
    42s
  • max time network
    131s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    11-09-2024 22:05

General

  • Target

    abce8bd54a83e5f633f5a7ed768eded74763f881470d1a56a6dbee9545fbb76a.apk

  • Size

    2.7MB

  • MD5

    84f816175428997fd2050de418ed3ca6

  • SHA1

    da5470ac14ed550890f6adeaacfeb01697cb7f13

  • SHA256

    abce8bd54a83e5f633f5a7ed768eded74763f881470d1a56a6dbee9545fbb76a

  • SHA512

    e18e4ee586a838feab6e28841390039822c3d6d5c2df14abb77534a38acbc83207bb4d8b73679a7e8b0ccd59268f37cfdd83c172364418ce73609930c1d8c90e

  • SSDEEP

    49152:/cDtt4uNL5PR1mJ2Lg8C4yW2Z+Ng8DfH8cjBbnyEG3/s:OttPzmX4oQdD8cjVx

Malware Config

Extracted

Family

ermac

C2

http://91.215.85.223:3434

AES_key

Extracted

Family

hook

C2

http://91.215.85.223:3434

AES_key

Signatures

  • Ermac

    An Android banking trojan first seen in July 2021.

  • Ermac2 payload 2 IoCs
  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.feboramudima.dubave
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4257
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.feboramudima.dubave/app_DynamicOptDex/IfMx.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.feboramudima.dubave/app_DynamicOptDex/oat/x86/IfMx.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4283

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.feboramudima.dubave/app_DynamicOptDex/IfMx.json

    Filesize

    675KB

    MD5

    1dd0cb79dfaed9d876b7d13bf0917859

    SHA1

    563c649bf72a7b80ba2747c16e9150b8048c68f1

    SHA256

    920f853645bd2606739ea627d3ca592351f03780b04d3504f7991675b958251d

    SHA512

    f071645891698959a109e476325b6361ef580fbc2ab4b306a2a6c55149e24c4b159d5d6f5f442b08789f14732c826dd5f1edb2e12c88df3c2e2cf9e587274ec6

  • /data/data/com.feboramudima.dubave/app_DynamicOptDex/IfMx.json

    Filesize

    675KB

    MD5

    cea17bedea880e352f7971e2a8a529d3

    SHA1

    3a76ffad1aea54a54d622b5a345068398b9cef45

    SHA256

    5fa3781affc534371d7c1c256b8f902cfc8c0dd2f94be1ec1bc10111f1365a41

    SHA512

    c499d8c46ac217efdcd27eb4da9a5985962d8ea076ccfb3114dd5c51d118c4ddea96608b030981b6ccf301c0914525f1161d2005de609beef7100eefa100411e

  • /data/data/com.feboramudima.dubave/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.feboramudima.dubave/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    c2a5e7c03f61e8a2b7dd6fc81859dfe8

    SHA1

    d48adc5f0a94442ea1aabb2cfc96a47309ec838e

    SHA256

    3253e11008a5680b6597614066de41b294a9ed2a969e644bfb146a4cc774c01d

    SHA512

    b42c9f0ff869c4a2ce40ef26f6703c94c46b475cf1ca9b2630ef6aa43146b68fd475a2963be66bc50d4f94cc88227c578b902b776c7aaf167561a45c07330bd4

  • /data/data/com.feboramudima.dubave/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.feboramudima.dubave/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    cea10d01640e349ba7ad4a79dad294bb

    SHA1

    01582ed161b38235d85b6774f2d894ef6341860a

    SHA256

    a0c163348dbff1dab0b00e809b519389cbca14c432fa7765ddfb60d776e52203

    SHA512

    c16778eecfe3878c80062b61721f8caf13f6aad20b9bae045b1bff66ce5f08a4d02001c8b5c38d0f6dddc4fe8a11cc4d37ab7db4ceb84dbc41bd2c0c09c7f314

  • /data/data/com.feboramudima.dubave/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    50b3c7303c970be5a964264f2e70e658

    SHA1

    639a0bb723b152bef86a6bcf69eee55442159a6a

    SHA256

    040cedc2c815dc4f319fef562b2d76897dd3edbb03912864ed8250498b554c6d

    SHA512

    5bd92e8f58fc1c36f2adb56ea7d9d65685bd8856f10f8f8e4d7a165850258a3b9a01e717f4267b1a8380d7308e651a873ca61382ed96cfcd5146850728a7d7c7

  • /data/data/com.feboramudima.dubave/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    492d1f8c46ad4816c2cc17d127f2af00

    SHA1

    c5d2f4e223adc3655431c7842668cbe58ab518df

    SHA256

    38f5e821765b22c387f0f1d9837bb0dc3dd0f9fc572aec8a8a5325dd2bc61aaf

    SHA512

    0521b1d758c48095e300ae92022fe79d9b150e39fe8865174574257e6cacb5c3847da67906c6b1befbcf113cc6cfe15fdfcdcc0eda067a92f52d1bd5f5d6197e

  • /data/user/0/com.feboramudima.dubave/app_DynamicOptDex/IfMx.json

    Filesize

    1.5MB

    MD5

    7bf755464bda2a480ff610110dabd5d8

    SHA1

    56e732c3f1bdb9d0b49b7ab3d64868e702f8e13f

    SHA256

    253aa7d0620624e7ac6042c3456394d59b7576aac8965eb2aae12786b97f9fa9

    SHA512

    81537032c078d59fa36af65132711143f37a5b20dc3120db2190509bf945012c30e3e74b4bb4114708076c2a9bbb527fd8fd088b94747e66343e605be3ace9fc

  • /data/user/0/com.feboramudima.dubave/app_DynamicOptDex/IfMx.json

    Filesize

    1.5MB

    MD5

    45b8130deaa1b09ac8ab73cffc282cce

    SHA1

    1ef7d3bc07c5b9cb31c2e2afcd5e02f8cf0a00a7

    SHA256

    129550d8ca6c44d0137d3bcd4400aa73717491edf183448579ffe3456ced8c86

    SHA512

    49fb2ab47def95deb1a4479fd6df5c1def4d3abeb134e53aba3dea1506e9395d57e72362bd0ba3662604d19fe5264967d7d58f59329ba506c2fde62eed1e6ee3