Analysis
-
max time kernel
147s -
max time network
153s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
19-10-2024 22:14
Static task
static1
Behavioral task
behavioral1
Sample
5df28198041f8cfcd392d60e875f0b606d2115d4bcee9ca827fb313e6a8a7186.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
5df28198041f8cfcd392d60e875f0b606d2115d4bcee9ca827fb313e6a8a7186.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
5df28198041f8cfcd392d60e875f0b606d2115d4bcee9ca827fb313e6a8a7186.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
5df28198041f8cfcd392d60e875f0b606d2115d4bcee9ca827fb313e6a8a7186.apk
-
Size
914KB
-
MD5
f7b6c814eb20717f22b867ae2a7fbfcc
-
SHA1
87f2990c105ef03c73ab0719b95809ef5776a74b
-
SHA256
5df28198041f8cfcd392d60e875f0b606d2115d4bcee9ca827fb313e6a8a7186
-
SHA512
6c3c98e9c01c24339815019f86c669d99271e3cb77747129fb67832566d8fc3b775fa7e681d4792e64c99550d4c4e482ccc563952b909d4985497b8cc0f6939c
-
SSDEEP
24576:6AHVNsExZ+2nld4yd8gJKk0+d072pcBnT:6AH0oTldfnA+aKSx
Malware Config
Extracted
ermac
http://154.216.18.241:3434
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac2 payload 1 IoCs
resource yara_rule behavioral1/files/fstream-1.dat family_ermac2 -
pid Process 4286 SelcukSportsazer.apk -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/SelcukSportsazer.apk/app_apkprotector_dex/classes-v1.bin 4286 SelcukSportsazer.apk /data/user/0/SelcukSportsazer.apk/app_apkprotector_dex/classes-v1.bin 4286 SelcukSportsazer.apk -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText SelcukSportsazer.apk Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId SelcukSportsazer.apk Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId SelcukSportsazer.apk -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock SelcukSportsazer.apk -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground SelcukSportsazer.apk -
Performs UI accessibility actions on behalf of the user 1 TTPs 7 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction SelcukSportsazer.apk android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction SelcukSportsazer.apk android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction SelcukSportsazer.apk android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction SelcukSportsazer.apk android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction SelcukSportsazer.apk android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction SelcukSportsazer.apk android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction SelcukSportsazer.apk -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone SelcukSportsazer.apk -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS SelcukSportsazer.apk -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver SelcukSportsazer.apk -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal SelcukSportsazer.apk -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo SelcukSportsazer.apk -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo SelcukSportsazer.apk
Processes
-
SelcukSportsazer.apk1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4286
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
686KB
MD53638d216c8ae1a7036e286f31a21d2a2
SHA1c912f2502d748fbe89fa5aa9a879353b847692c3
SHA2562b294598b6c63a03ca760887548a16031616ba5660af251a177eed63d92f48ad
SHA512a471912ece0302d069a4461f78a7a757d64c22d703a71c4ad0c7c3d8eb81d88491c3f66a4f5c9033ea81cbde4a3d6c5a876f6eb104f8a798428143769f5ad291