Analysis

  • max time kernel
    38s
  • max time network
    155s
  • platform
    android_x64
  • resource
    android-x64-20240624-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system
  • submitted
    11-09-2024 22:05

General

  • Target

    abce8bd54a83e5f633f5a7ed768eded74763f881470d1a56a6dbee9545fbb76a.apk

  • Size

    2.7MB

  • MD5

    84f816175428997fd2050de418ed3ca6

  • SHA1

    da5470ac14ed550890f6adeaacfeb01697cb7f13

  • SHA256

    abce8bd54a83e5f633f5a7ed768eded74763f881470d1a56a6dbee9545fbb76a

  • SHA512

    e18e4ee586a838feab6e28841390039822c3d6d5c2df14abb77534a38acbc83207bb4d8b73679a7e8b0ccd59268f37cfdd83c172364418ce73609930c1d8c90e

  • SSDEEP

    49152:/cDtt4uNL5PR1mJ2Lg8C4yW2Z+Ng8DfH8cjBbnyEG3/s:OttPzmX4oQdD8cjVx

Malware Config

Extracted

Family

ermac

AES_key

Extracted

Family

hook

AES_key

Signatures

  • Ermac

    An Android banking trojan first seen in July 2021.

  • Ermac2 payload 1 IoCs
  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.feboramudima.dubave
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4944

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.feboramudima.dubave/app_DynamicOptDex/IfMx.json

    Filesize

    675KB

    MD5

    1dd0cb79dfaed9d876b7d13bf0917859

    SHA1

    563c649bf72a7b80ba2747c16e9150b8048c68f1

    SHA256

    920f853645bd2606739ea627d3ca592351f03780b04d3504f7991675b958251d

    SHA512

    f071645891698959a109e476325b6361ef580fbc2ab4b306a2a6c55149e24c4b159d5d6f5f442b08789f14732c826dd5f1edb2e12c88df3c2e2cf9e587274ec6

  • /data/data/com.feboramudima.dubave/app_DynamicOptDex/IfMx.json

    Filesize

    675KB

    MD5

    cea17bedea880e352f7971e2a8a529d3

    SHA1

    3a76ffad1aea54a54d622b5a345068398b9cef45

    SHA256

    5fa3781affc534371d7c1c256b8f902cfc8c0dd2f94be1ec1bc10111f1365a41

    SHA512

    c499d8c46ac217efdcd27eb4da9a5985962d8ea076ccfb3114dd5c51d118c4ddea96608b030981b6ccf301c0914525f1161d2005de609beef7100eefa100411e

  • /data/data/com.feboramudima.dubave/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.feboramudima.dubave/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    acf86389656d6d8cccca736a4ec6dd55

    SHA1

    ba96eba5e5a0ae9b0745c86611549ce8323e8714

    SHA256

    c42533607988b495b23b119cb6e958ae8915a0533349d6f8bd523e29d0b704a2

    SHA512

    35a8e95be7d034d98dca0f516cd9801cdecf612785e0169486929c7a300b929ad36beabd8037d166d3da553457079816791ea3c531c3687839862dc7a830f29d

  • /data/data/com.feboramudima.dubave/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.feboramudima.dubave/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    9162ba404c61cdddf97cfac342ce532b

    SHA1

    37aa24181ec43ca9a16bf77fdc8c8e22ed0cf31c

    SHA256

    c32d4c86fdd661268e06d2429a3df489d2e44e7fe2f36af7599d3b281f9bfb2d

    SHA512

    0abd5d1224afd808b5a11db4684a6a52f38186f4f13487226dfdf06a1c397c62706b0a41c9532131734b2158fdadab6a840ab65d0080238913c3ea8c0c9da212

  • /data/data/com.feboramudima.dubave/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    b812e0381a7d259ed98e4a9e099b865c

    SHA1

    230eeac6a04a55d8ad02af91e926f8c308f07c3a

    SHA256

    1627e5275d80ef742708489fa9094ab51e00831b077550728082bcd2349b0968

    SHA512

    e7c93a27352e8c9a8466d551a43c08570e3f53737c27c5d3d7f7f41b1034d8ee7e63dc96ebb27bc4d167063e56913f1083cca98be372b76c7e67d20c6c12d539

  • /data/data/com.feboramudima.dubave/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    872ab2d582e2519f91c3bb8b27f4d429

    SHA1

    967c395009d3a62971374c4a39066a87a2dc9adc

    SHA256

    95f609a343daf57c41d3878131cc5635011e4a7425176102e07ca2d7df52608c

    SHA512

    f78b3c26c758d8f76d59a6e9f81ed33ce8bf268cfe7905b3bdd6fabc5d8820ba0986afe168f19aae8a824571002bc6e3a3b785563e5ed6674c59c835f8a0e457

  • /data/user/0/com.feboramudima.dubave/app_DynamicOptDex/IfMx.json

    Filesize

    1.5MB

    MD5

    45b8130deaa1b09ac8ab73cffc282cce

    SHA1

    1ef7d3bc07c5b9cb31c2e2afcd5e02f8cf0a00a7

    SHA256

    129550d8ca6c44d0137d3bcd4400aa73717491edf183448579ffe3456ced8c86

    SHA512

    49fb2ab47def95deb1a4479fd6df5c1def4d3abeb134e53aba3dea1506e9395d57e72362bd0ba3662604d19fe5264967d7d58f59329ba506c2fde62eed1e6ee3