Analysis
-
max time kernel
149s -
max time network
157s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
29-09-2024 22:05
Static task
static1
Behavioral task
behavioral1
Sample
f5b14d5b068f5f0b4ff0ce54ebac9d16fe57d1dfbe571441d11f8ad014d38ae2.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
f5b14d5b068f5f0b4ff0ce54ebac9d16fe57d1dfbe571441d11f8ad014d38ae2.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
f5b14d5b068f5f0b4ff0ce54ebac9d16fe57d1dfbe571441d11f8ad014d38ae2.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
f5b14d5b068f5f0b4ff0ce54ebac9d16fe57d1dfbe571441d11f8ad014d38ae2.apk
-
Size
2.1MB
-
MD5
32c53b6ff8f3f834e554321b385810e5
-
SHA1
b3bd943262572ce0705fc8e478cacaa5bd62f6f0
-
SHA256
f5b14d5b068f5f0b4ff0ce54ebac9d16fe57d1dfbe571441d11f8ad014d38ae2
-
SHA512
8ee411658b8e92adabcbdfbf614caeb93f89151468d1669228415852bb909180dbd4982773d5cf0926c24f7ddbfc8f6a6b9931e321c9b049d75c41540f333ca9
-
SSDEEP
49152:zkM0799ib9i7ARHg8nCUpUm4g6XGv8pyw8hrHYxEtFlL2:wM07uUuCUWpsA+hLYxEtFc
Malware Config
Extracted
ermac
http://91.215.85.23:3434
Extracted
hook
http://91.215.85.23:3434
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac2 payload 1 IoCs
Processes:
resource yara_rule /data/user/0/com.wiwolasamiwa.remamiri/app_DynamicOptDex/skOQy.json family_ermac2 -
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.wiwolasamiwa.remamiriioc pid process /data/user/0/com.wiwolasamiwa.remamiri/app_DynamicOptDex/skOQy.json 4495 com.wiwolasamiwa.remamiri -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.wiwolasamiwa.remamiridescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.wiwolasamiwa.remamiri Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.wiwolasamiwa.remamiri Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.wiwolasamiwa.remamiri -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.wiwolasamiwa.remamiridescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.wiwolasamiwa.remamiri -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.wiwolasamiwa.remamiridescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.wiwolasamiwa.remamiri -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.wiwolasamiwa.remamiridescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.wiwolasamiwa.remamiri -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.wiwolasamiwa.remamiridescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.wiwolasamiwa.remamiri -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.wiwolasamiwa.remamiridescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.wiwolasamiwa.remamiri -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.wiwolasamiwa.remamiridescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.wiwolasamiwa.remamiri -
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
com.wiwolasamiwa.remamiridescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.wiwolasamiwa.remamiri -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.wiwolasamiwa.remamiridescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.wiwolasamiwa.remamiri -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.wiwolasamiwa.remamiridescription ioc process Framework API call javax.crypto.Cipher.doFinal com.wiwolasamiwa.remamiri -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.wiwolasamiwa.remamiridescription ioc process File opened for read /proc/cpuinfo com.wiwolasamiwa.remamiri -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.wiwolasamiwa.remamiridescription ioc process File opened for read /proc/meminfo com.wiwolasamiwa.remamiri
Processes
-
com.wiwolasamiwa.remamiri1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4495
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e23a3361cde1fc977832d55c589548db
SHA1d06d5a393b57d707cf66d5265946a8e8bb27e2c5
SHA25605214eac541f91cbfc91920657c21ff454f10892d23f08cc79e4494e2baeda91
SHA5121b5b7f2a7c2e461361dc943052fb81ea705810cb7f4092414d94f94536c3050c01742a1c15f6531e96f300130c5e14e52c62fa2d9cd7ed4998e0241e640d8386
-
Filesize
674KB
MD51430239d90c4327ed144c387eda34855
SHA1603a1489f4c358b8bf87cdc74660e4a82b869c09
SHA256f37b8b5f098f87294442ea894a3fe91043bfed45678540bf0fe38aa80c2bc983
SHA512c75c0c5c485da5756bd2123fe0655a5ccfab46965b22d31ab6c96c20bf98aceb7f9035f75d993e0290f3e691b584398143f3ee362400c92ecf055143ea0a0fb9
-
Filesize
674KB
MD56fe1776cd523d56d09d0d5d78751492f
SHA10337efc5a8b75a1884a9d0aa351548ef815a6707
SHA2566f2eeb8cc392ca49f02d14b875687b5046162a3846b70552e65c46e0dcf0a3e9
SHA512a609e48e625ef3e61777b68971eb299696a46aeb1260413d13bff77e7ac2f19aa7f4f68fba3f5a65d1cc58d36dae8af7b056f5b9c25db748b4a6ff110846ab92
-
Filesize
1.5MB
MD5342a8740740fb866f441f4e1e6c5c66a
SHA1172073e7d97a040025fd2a80ebcfde7b7b65a573
SHA256264d2ce4a7c6c59353086bc006d0c7cfecdedc2d2926711cadd1543762991581
SHA512640726dbe29200cf7f5daeab8d678e2664f9e672d746f630ca5aab76d2d4e189e5bdbb2552f5650755694e744d7f310418ab30eab1ebe3cc01f7d6c4ea177461
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD51b20a0474772c4b4b994c5f58b8a31ab
SHA11e65083f6c7f41677079c33bbb4041b40285df09
SHA256aa661fbc3fcc43f9dcdccbb59a54325f4d94ec526277801a0b60c980de17d9d2
SHA512ca538ec1648d713c7f2ab82d49e5583a09e4bb8ecf1a96a9c984350871b3b6df2014cbebb757f692ca20d9e5ba0b60571e73b398576f840b84fffdbaf2d9ba11
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5a022b20f44d1f613d57d53578f762dd8
SHA12ed1093039dfdfaa018b55ad2ac54593287df347
SHA25630058070b5e8fe1292b15ab1f52b6d3df75bb613061563724a009a4a6692002c
SHA51258efb2138ccd198f0695aa1ce4b05b744d8f81b928b36a89e31b3a93c6fe483777f79f4706f465de97ec0543f3af594deaa19ad8687376559e375bb677559205
-
Filesize
108KB
MD546d6a0a18b28bbda544ed21d728b5c00
SHA136ba2fdfac5f2a20bae614930f3951933d4294ab
SHA256bee284fb97786f925ec02991fa03b579045110d01a11c6a9948db1bfe502d360
SHA5127e4547386971ee5aefef050fcc834ab1ce55f01510995935a5e3678211612afdd84becb759393483bbbe3e0cfb319ccd0689584256955ce6b6dcfc1eb38a2418
-
Filesize
173KB
MD5f01bd91412893c7f432951b309c21f78
SHA166dc44877a598a1a5149cb0b9d613a4e670ebf4f
SHA25669ac400485dd4e0179118873557d0235d027d9764d191a5dbaad554d9af0c9b7
SHA512440ca4d3d282300a2c8e408896b98783750ffb7b404837db805ae5e507319bab8168d84cc18c74456fcbd830982e07a8cf8db5973ed920fb998720929fc50a92