Analysis
-
max time kernel
148s -
max time network
158s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
13-11-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
340e71ba5dac819019db71c97dbb769716ecbdf4943557eaca57ffc9b4272ee6.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
340e71ba5dac819019db71c97dbb769716ecbdf4943557eaca57ffc9b4272ee6.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
340e71ba5dac819019db71c97dbb769716ecbdf4943557eaca57ffc9b4272ee6.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
340e71ba5dac819019db71c97dbb769716ecbdf4943557eaca57ffc9b4272ee6.apk
-
Size
4.4MB
-
MD5
e5bb145e354c762853512ae207f0adf7
-
SHA1
90420d49ffb21e5f3bfe6ea8f4666d163565434c
-
SHA256
340e71ba5dac819019db71c97dbb769716ecbdf4943557eaca57ffc9b4272ee6
-
SHA512
e16ac960abcef1c4aec066575e7cf98520406186a843df901a749bb88c95beb094830df185c23eeb15d18bfa9e9d6780ec16aa4c93f3c353f0270501c86c3de3
-
SSDEEP
98304:MY4JCFjk4f5cneEY1EpnPGioPFKQvtSb2yubA4iMEETaEWAZNl1up+jFv8N:sJCFD+++F8FKjIH1U+jFv8N
Malware Config
Extracted
ermac
http://154.216.17.184
Extracted
hook
http://154.216.17.184
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac family
-
Ermac2 payload 2 IoCs
resource yara_rule behavioral1/memory/4322-0.dex family_ermac2 behavioral1/memory/4296-0.dex family_ermac2 -
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.dehodigipuhixoyi.mafuko/app_night/inc.json 4322 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.dehodigipuhixoyi.mafuko/app_night/inc.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.dehodigipuhixoyi.mafuko/app_night/oat/x86/inc.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.dehodigipuhixoyi.mafuko/app_night/inc.json 4296 com.dehodigipuhixoyi.mafuko -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.dehodigipuhixoyi.mafuko Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.dehodigipuhixoyi.mafuko Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.dehodigipuhixoyi.mafuko -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.dehodigipuhixoyi.mafuko -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.dehodigipuhixoyi.mafuko -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.dehodigipuhixoyi.mafuko -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.dehodigipuhixoyi.mafuko android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.dehodigipuhixoyi.mafuko android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.dehodigipuhixoyi.mafuko android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.dehodigipuhixoyi.mafuko android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.dehodigipuhixoyi.mafuko -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.dehodigipuhixoyi.mafuko -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.dehodigipuhixoyi.mafuko -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.dehodigipuhixoyi.mafuko -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.dehodigipuhixoyi.mafuko -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.dehodigipuhixoyi.mafuko -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.dehodigipuhixoyi.mafuko -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.dehodigipuhixoyi.mafuko
Processes
-
com.dehodigipuhixoyi.mafuko1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4296 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.dehodigipuhixoyi.mafuko/app_night/inc.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.dehodigipuhixoyi.mafuko/app_night/oat/x86/inc.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4322
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
736KB
MD5f663ee4109d2144d9678248622dcf9d1
SHA191b56d98c5d4eafdc5b6da3200e76585eb495aa5
SHA25630ce1e93492d954d4eb77850d7436855100775dd83aad9f662e3080849bf09bc
SHA512ca168efa2471e7088d65ad7aaff7de0e7a923febc9f13b3b23f9bf56028213b9d4e164948edd38193c2bdca333d2ce9ee116602593672f69fb75a70d3314f6e7
-
Filesize
736KB
MD59a68cb07b9dc0c1e50cfc93dad7750ae
SHA1a0acb747058c8295c12eb225ff6d494964085a44
SHA256b2a48069743e102c21f4ac8f5371c4e2da950854844b802f655a6c66749af9d8
SHA512d93848b3989d9327b5d737b6560f2093e3b0e61d9a5ad0a0f3687fe4b2cf6838585600179734a881d5b663366aff1e5c29fca206aaf20d5bbbe45a2604465cd4
-
Filesize
2KB
MD5026303acf649b777dd69ed64b53687a4
SHA194e756cd875ba244493b6a8a2de44a733dc80e40
SHA2561d9e9a943b569ad4b428112cf2070036f58c1390f3a1f8e6bec943ffc66aef3f
SHA5129730c5c48ef023e49571a2457b355e4331c9f6c3a706fe831d8b9624ba7664362dabdb147a181ffab83439d9d510da5d5055fcc2aeff4774f2c788a406e15c37
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5de538dc6cb31bbff289bc1d7f2e7c438
SHA1a88c20915ac174fb868cc26a5f91794a82438d00
SHA2568dc99115b2c30106dbb7c55fa75db0b11ec0f93fc26058dd6f223401cfbf715e
SHA512f4aa37e687d4459d016419f07249ed0ed718b2242ad7c7abc96d11e64a03260f55d2e8e31af1f5aa3af5d987fa2c67078faebf45d6d2c692f3cf096d2617bc14
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
108KB
MD5f230edc08624fa2b25af9a157d596f7f
SHA12f91ce4bc35526362fa074cac11a002400801582
SHA256ae6ede5a07caa96da17982c83151333ce4d2955371edd8b0106636e94753b781
SHA5122df9cf34e5d990395a9a1b6091bd15e8eda51aaa406a5686110249183f0faaa799e8abb533a09fa6d599a95e0de88fedfe5aa5eb2b634e5a5f1eabc4e87b9d0a
-
Filesize
173KB
MD529af31b368f20c47d97d9c58302d4966
SHA17b1fcd4c1bfd419f4a2725028b73fe31dfd112f3
SHA256531394bf5f155e3e58d0aae77a3bcba94ff901e8c1a10a399117b721294870c6
SHA512f9f6a54844e9cdbb5cc870583ed50019475a536b8d1f90e4777c9bbb6487687cab82d54578f97f40577f8158f7dc90c426e27790148c73bcd07c98013ca6b22f
-
Filesize
16KB
MD5a4c2c2eb8bff40b8547a7dd1240a7ce5
SHA1abe782106f61cdb82163d8fa13aeab6d81329954
SHA25610bf16ba2466ff7dc1b99dbea3182252d6fa052a42ed22608dc143a3aacf456c
SHA512d49b02888d695c03fd0ad55506981623d03f4c94f9b18d6c183071905d889707146ed94ab7c856ea45e926d3bafd83a377711d9e533a53824b096378633573a4
-
Filesize
1.7MB
MD5ddf7c83595b14e8e72d43c7400992c25
SHA1cc20fc07215206c375806eae2929b52f8101c8c5
SHA256e3755fbdceb7401b4fe0d81f5484ba0e05d3b9ca6f0e5ca510d4eb8b11b2e107
SHA5121960a705bc5664b11ce693d247b76c703bff9f6d57236b8228f98fe5fecb7d0f0520f7950171fca067db34100d112bf4b646f276fa469791b7d0106bada4c9fc
-
Filesize
1.7MB
MD51d33f152976a39caa123d6399591af9f
SHA19d50b41860d66a5750d88ca2cab5d8bc1e20037f
SHA256e84dc462be898347a130e7b3afe4e9eaa8a5f8b3a393aeb9d96e239aa3c1ac1e
SHA512d79e49c0a219e4385aec259cbe21577f41e846215515a91d05835c821f9f91c7d5b23f9ce1f8ae57565afe7a19043b332eda48ec929a309e80882dc556bb373d