Analysis
-
max time kernel
14s -
max time network
160s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
13-11-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
340e71ba5dac819019db71c97dbb769716ecbdf4943557eaca57ffc9b4272ee6.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
340e71ba5dac819019db71c97dbb769716ecbdf4943557eaca57ffc9b4272ee6.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
340e71ba5dac819019db71c97dbb769716ecbdf4943557eaca57ffc9b4272ee6.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
340e71ba5dac819019db71c97dbb769716ecbdf4943557eaca57ffc9b4272ee6.apk
-
Size
4.4MB
-
MD5
e5bb145e354c762853512ae207f0adf7
-
SHA1
90420d49ffb21e5f3bfe6ea8f4666d163565434c
-
SHA256
340e71ba5dac819019db71c97dbb769716ecbdf4943557eaca57ffc9b4272ee6
-
SHA512
e16ac960abcef1c4aec066575e7cf98520406186a843df901a749bb88c95beb094830df185c23eeb15d18bfa9e9d6780ec16aa4c93f3c353f0270501c86c3de3
-
SSDEEP
98304:MY4JCFjk4f5cneEY1EpnPGioPFKQvtSb2yubA4iMEETaEWAZNl1up+jFv8N:sJCFD+++F8FKjIH1U+jFv8N
Malware Config
Extracted
ermac
http://154.216.17.184
Extracted
hook
http://154.216.17.184
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac family
-
Ermac2 payload 1 IoCs
resource yara_rule behavioral2/memory/4975-0.dex family_ermac2 -
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.dehodigipuhixoyi.mafuko/app_night/inc.json 4975 com.dehodigipuhixoyi.mafuko -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.dehodigipuhixoyi.mafuko -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.dehodigipuhixoyi.mafuko -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.dehodigipuhixoyi.mafuko -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.dehodigipuhixoyi.mafuko -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.dehodigipuhixoyi.mafuko -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.dehodigipuhixoyi.mafuko -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.dehodigipuhixoyi.mafuko -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.dehodigipuhixoyi.mafuko -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.dehodigipuhixoyi.mafuko -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.dehodigipuhixoyi.mafuko -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.dehodigipuhixoyi.mafuko
Processes
-
com.dehodigipuhixoyi.mafuko1⤵
- Loads dropped Dex/Jar
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4975
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
736KB
MD5f663ee4109d2144d9678248622dcf9d1
SHA191b56d98c5d4eafdc5b6da3200e76585eb495aa5
SHA25630ce1e93492d954d4eb77850d7436855100775dd83aad9f662e3080849bf09bc
SHA512ca168efa2471e7088d65ad7aaff7de0e7a923febc9f13b3b23f9bf56028213b9d4e164948edd38193c2bdca333d2ce9ee116602593672f69fb75a70d3314f6e7
-
Filesize
736KB
MD59a68cb07b9dc0c1e50cfc93dad7750ae
SHA1a0acb747058c8295c12eb225ff6d494964085a44
SHA256b2a48069743e102c21f4ac8f5371c4e2da950854844b802f655a6c66749af9d8
SHA512d93848b3989d9327b5d737b6560f2093e3b0e61d9a5ad0a0f3687fe4b2cf6838585600179734a881d5b663366aff1e5c29fca206aaf20d5bbbe45a2604465cd4
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5b29cb53c1a0177f1cd8ee18f408f268b
SHA19a5da0626b23dc4b52db69ab6fd84a2382195f24
SHA2565e32ccc52ecaed1d40bdfd6f0bb93040e95dfe5aa3149bdec6658f031729ea16
SHA51202c1bace601cb395a45283afa60f8db1379840f65603d5272fe6f875fc07a1e634c12bef3fcddab91ef67ddcf28ab31211332b68174c8b0c50d36d6a3a03eae6
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5a796fd824f90e113914d0704bf0ea224
SHA19170f99a71e59dc5020365fd35f7f5a12fecc4ac
SHA256b476738d6970ec596c01d01fe2b59caee539595d88340067954d8308d36f2d88
SHA51261ecaf7bdc34866261b9ee4b1d9bd30d7708d6702bea0cce97836bcae4916a648efb299f51489c79090768d34b8bcb31d0c8faac03eefcb22dfe512b348f8ebe
-
Filesize
108KB
MD50d23aa6bc9032f9c16b7511e17639fcc
SHA17f4968c91e4876b1f6969b4bd2fada82a51d8af6
SHA256d62a7d56eaed67562d44e96e212566d75121414ccdadff55d8aa21ba7af1a2f8
SHA5127b030f250867ac0dcd6c3ee74c162c3418c0ef9d07a8eb7f6070a4b03357a330592ee3890028d70f74c5c52e32b93b9aaeda181d79d34fac680617c548b1322b
-
Filesize
173KB
MD5fad6bd5b0283f198b2d344bf08c34464
SHA14397fb4e1d5e44fdc2afd42a0b879ff8a81b1d6a
SHA256ce7ef907cc9af7802d2dee7f2687db15bae923e3c45c53a8e475f59b7054aea1
SHA512039d4bb8447d4ecdc32bcc09d4de7f0a85c299d51e84fed9ccea019776441828148258d6780ac627aec6252c3b5ddcd0f459ddc02fb060d1d868e0795613b5b8
-
Filesize
1.7MB
MD51d33f152976a39caa123d6399591af9f
SHA19d50b41860d66a5750d88ca2cab5d8bc1e20037f
SHA256e84dc462be898347a130e7b3afe4e9eaa8a5f8b3a393aeb9d96e239aa3c1ac1e
SHA512d79e49c0a219e4385aec259cbe21577f41e846215515a91d05835c821f9f91c7d5b23f9ce1f8ae57565afe7a19043b332eda48ec929a309e80882dc556bb373d