Analysis
-
max time kernel
149s -
max time network
157s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
05-10-2024 19:37
Static task
static1
Behavioral task
behavioral1
Sample
5-aligned-signed_en.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral2
Sample
5-aligned-signed_en.apk
Resource
android-x64-20240624-en
General
-
Target
5-aligned-signed_en.apk
-
Size
3.8MB
-
MD5
239e33c64d322f85cc05cc2d2a5234f4
-
SHA1
223efb835a820ad6bd4611b9eba3e9eb0d159736
-
SHA256
dfc6b7f14b14efcb7914cc06638de4fc6807b46d0cd5c6e1ad48e6dc247da0c7
-
SHA512
7ce21abdeaf7d81f0731dc8478ef6260b8ef9f74c4e0a31733a1102ce35aef32d44c48e22192a644aa8ca856e7d2e3081fb96eccdb632dd9a26d2bf07f3e8a85
-
SSDEEP
98304:k20r2QFjrI1AuY/QtkxjC4Niw1Jo75ckB4E7EmbER5tH7:kPrxRydtkXSZ4E9bE9
Malware Config
Extracted
ermac
http://176.111.174.221:3434
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac2 payload 1 IoCs
resource yara_rule behavioral2/files/fstream-1.dat family_ermac2 -
pid Process 4961 com.goqypntzr.nedsfxupf -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.goqypntzr.nedsfxupf/app_app_dex/jxujfoh.kpn 4961 com.goqypntzr.nedsfxupf /data/user/0/com.goqypntzr.nedsfxupf/app_app_dex/jxujfoh.kpn 4961 com.goqypntzr.nedsfxupf -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.goqypntzr.nedsfxupf Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.goqypntzr.nedsfxupf Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.goqypntzr.nedsfxupf -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.goqypntzr.nedsfxupf -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.goqypntzr.nedsfxupf -
Performs UI accessibility actions on behalf of the user 1 TTPs 13 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.goqypntzr.nedsfxupf android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.goqypntzr.nedsfxupf android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.goqypntzr.nedsfxupf android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.goqypntzr.nedsfxupf android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.goqypntzr.nedsfxupf android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.goqypntzr.nedsfxupf android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.goqypntzr.nedsfxupf android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.goqypntzr.nedsfxupf android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.goqypntzr.nedsfxupf android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.goqypntzr.nedsfxupf android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.goqypntzr.nedsfxupf android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.goqypntzr.nedsfxupf android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.goqypntzr.nedsfxupf -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.goqypntzr.nedsfxupf -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.goqypntzr.nedsfxupf
Processes
-
com.goqypntzr.nedsfxupf1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Uses Crypto APIs (Might try to encrypt user data)
PID:4961
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5d4afcdd37967580b75520904ecbc2b20
SHA1a15aa70c556215a7d378aa8051aadab4b68d4a65
SHA2560e8327d13117d26bf1e6fbb18db8886bd0f609778eb60753f9897916cddd1076
SHA512bc704a0d99ffb2918ae36901cfda3b13a5548d1af410f5390d78f7ee0a08d2189e49f0bbea302ecc74a29b1e1bfa22c07b4fa02a4cafa8d0e2a5698c71717b09