Analysis
-
max time kernel
148s -
max time network
151s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
10/11/2024, 22:10
Static task
static1
Behavioral task
behavioral1
Sample
8892669e7007e196669b1f791bf63340851de45f5180857e759a64f1c926951e.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
8892669e7007e196669b1f791bf63340851de45f5180857e759a64f1c926951e.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
8892669e7007e196669b1f791bf63340851de45f5180857e759a64f1c926951e.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
8892669e7007e196669b1f791bf63340851de45f5180857e759a64f1c926951e.apk
-
Size
3.8MB
-
MD5
26dae835f9f210e04d2eddfc9f749d03
-
SHA1
99d7ab9dbb67e2062c7cb6ded2a1d2e2c7d0d52f
-
SHA256
8892669e7007e196669b1f791bf63340851de45f5180857e759a64f1c926951e
-
SHA512
245ee6f21fb12a2b1308fa0a91a203e07bdb3b511857dc292ebbe1441c1c123536346ed1e895741409464931b16a24338daf80383a410670cc60e89f8e5b5ddd
-
SSDEEP
98304:ARkEEuvf+8i4sud5m2Aq8Pc3wBdhe72XNqAgNg4WWf3G7aEWAzKJ25rMEKz:C44HwqDNghoWV0
Malware Config
Extracted
ermac
http://94.141.120.34
Extracted
hook
http://94.141.120.34
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac family
-
Ermac2 payload 1 IoCs
resource yara_rule behavioral3/memory/4866-0.dex family_ermac2 -
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.dehodigipuhixoyi.mafuko/app_whip/OstoPu.json 4866 com.dehodigipuhixoyi.mafuko -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.dehodigipuhixoyi.mafuko Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.dehodigipuhixoyi.mafuko Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.dehodigipuhixoyi.mafuko -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.dehodigipuhixoyi.mafuko -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.dehodigipuhixoyi.mafuko -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.dehodigipuhixoyi.mafuko -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.dehodigipuhixoyi.mafuko -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.dehodigipuhixoyi.mafuko android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.dehodigipuhixoyi.mafuko android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.dehodigipuhixoyi.mafuko android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.dehodigipuhixoyi.mafuko android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.dehodigipuhixoyi.mafuko -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.dehodigipuhixoyi.mafuko -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.dehodigipuhixoyi.mafuko -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.dehodigipuhixoyi.mafuko -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.dehodigipuhixoyi.mafuko -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.dehodigipuhixoyi.mafuko -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.dehodigipuhixoyi.mafuko
Processes
-
com.dehodigipuhixoyi.mafuko1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4866
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
735KB
MD5ad7e91d43ee04447bc3e602c11986550
SHA1450385db6d24bcdec0a1c9fdfaf87044d84abb91
SHA2566b77b850a9fc9ad0148113a6f03deb80fd5153624fe2d1cca3384ae4e4c4401d
SHA512b7fdde6240fe281c5038f1d7341ef23244b0fba7b1b4d190b4b6d75f5b7baf7e23601be9994682b644af46c65c00648c0b1e8bb658e12f2912466c16b93181b2
-
Filesize
735KB
MD5036f0b98dc3fc40d9fe2835d848689e6
SHA102fce523ecef1d198a52ec0624117035efc29028
SHA256c1dee77e2d1a4a5fd0207fc25048b8411d92e1b695ba633fa493561e45593697
SHA512e2198f572432a2b6e57dd5e3fd2a596fd1d6af88807a9c709cfa8e1d1ca7b581f8c9039a21f9c3dc1058083c54e570811a8a9fa4b47aa9798b0b86598cb5f9e6
-
Filesize
3KB
MD5e02fa7d0923e85831724178a17bf8bcb
SHA1e07b1734e4f930e39be58ef8f3b3ddd469368f4c
SHA2565d1f99cc50f10f36b772bcb93dc44c17de118679d15d5abfb5fc2f9b590a35e6
SHA51277e41576aa9d237509c1a97c523610ff7e40fd238390fcbf3ff3722fa42b148a83e57f8e3673dd5c0fc37b811a074af9eac1518ada02a8b11984356a26d9b543
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD51260b16fb93af039899c9a6ab398be55
SHA1adf18c6a75199108cad8d7114541cee05de0e7d8
SHA256c0bc5493bb2b0d387dda84a11432da2358a8395ea326e10bebf3f7ac96d461a1
SHA512945babe4fc14b3ed0ff4ef06ba867cbd1bc335e6a0c6290277745f425f2cf6428a1f9eb5da071e32bcd46250b974c1ae952873383e670e0eaec67b739a7e3f80
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD52ba482e9f8848d10ac8f49c810088711
SHA1586f388ddcb23a70729c8a6212a9a0718da90eca
SHA25619e637883e30a8918a11bab0205212124641d81cafd0a38c1cec4f9be906582c
SHA51264e36c7866408b4ad639b05c736d734d280ede59476e1079e4cbf4fba92e52660e82d41e39982bfe7287d2aa1c27d5c2e12b93531654354f9d45fe91104c89e5
-
Filesize
108KB
MD543195746ca37668f4d456da26542bb84
SHA15eb8aa22a9f5ca6786c492c332544c96bad6d159
SHA2560e8ab1df9e0ee5936d384e7acf0d663a9f4aa442f07beaf46a234830ff7246ed
SHA5125de0f5f8901fe49a75f96d38a72c4376304af46bae21fbdffea61f64ebd47f42efe1e9ad82179383ba58a03530e4a5d95e03a8fa54f6b4ebd22b43838fad623c
-
Filesize
173KB
MD5ff59df4d9c986c619870c82f8f47b833
SHA16f6f428e063d0170ec9f19bfb65ee2f6b0b8abbe
SHA2568980540ec238839fe7bd3ce00d1fbb87a5f03b5da40cf11b3ec3d31dcd9f0a23
SHA512c214e1e4064de3754cfbfd1f99baffb9eb7d479bcc53f0803e1c531d8f63f2bfca305f9d75d7b68f66b68e92b548b1151ed7165fdfa33c87046e45b46bc4be25
-
Filesize
1.7MB
MD56a145b0b47a2a5dc41b1020f6bd4c0a7
SHA11a256b5965697dae849dca62d3f649c6f18ac64c
SHA256ff9402035bec2686580bc76003822f2ec88c6aaadadd2ce4422323b903d05d87
SHA5120783debcf7e91e5da1a49bde9fd6016a6f62f49df9579dcdc2809c6178a72928276e8fc2c7672b95401a459996f5dd6f9ab3fc72a3f5bb782e11428dadff2288