Analysis

  • max time kernel
    147s
  • max time network
    159s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    13-11-2024 22:03

General

  • Target

    340e71ba5dac819019db71c97dbb769716ecbdf4943557eaca57ffc9b4272ee6.apk

  • Size

    4.4MB

  • MD5

    e5bb145e354c762853512ae207f0adf7

  • SHA1

    90420d49ffb21e5f3bfe6ea8f4666d163565434c

  • SHA256

    340e71ba5dac819019db71c97dbb769716ecbdf4943557eaca57ffc9b4272ee6

  • SHA512

    e16ac960abcef1c4aec066575e7cf98520406186a843df901a749bb88c95beb094830df185c23eeb15d18bfa9e9d6780ec16aa4c93f3c353f0270501c86c3de3

  • SSDEEP

    98304:MY4JCFjk4f5cneEY1EpnPGioPFKQvtSb2yubA4iMEETaEWAZNl1up+jFv8N:sJCFD+++F8FKjIH1U+jFv8N

Malware Config

Extracted

Family

ermac

C2

http://154.216.17.184

AES_key

Extracted

Family

hook

C2

http://154.216.17.184

AES_key

Signatures

  • Ermac

    An Android banking trojan first seen in July 2021.

  • Ermac family
  • Ermac2 payload 1 IoCs
  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.dehodigipuhixoyi.mafuko
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4609

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.dehodigipuhixoyi.mafuko/app_night/inc.json

    Filesize

    736KB

    MD5

    f663ee4109d2144d9678248622dcf9d1

    SHA1

    91b56d98c5d4eafdc5b6da3200e76585eb495aa5

    SHA256

    30ce1e93492d954d4eb77850d7436855100775dd83aad9f662e3080849bf09bc

    SHA512

    ca168efa2471e7088d65ad7aaff7de0e7a923febc9f13b3b23f9bf56028213b9d4e164948edd38193c2bdca333d2ce9ee116602593672f69fb75a70d3314f6e7

  • /data/data/com.dehodigipuhixoyi.mafuko/app_night/inc.json

    Filesize

    736KB

    MD5

    9a68cb07b9dc0c1e50cfc93dad7750ae

    SHA1

    a0acb747058c8295c12eb225ff6d494964085a44

    SHA256

    b2a48069743e102c21f4ac8f5371c4e2da950854844b802f655a6c66749af9d8

    SHA512

    d93848b3989d9327b5d737b6560f2093e3b0e61d9a5ad0a0f3687fe4b2cf6838585600179734a881d5b663366aff1e5c29fca206aaf20d5bbbe45a2604465cd4

  • /data/data/com.dehodigipuhixoyi.mafuko/app_night/oat/inc.json.cur.prof

    Filesize

    3KB

    MD5

    d24e861523d30256c57161ddfe0ca699

    SHA1

    07ff9a68eee278aa6368c4e8bb2d0e4801af32fb

    SHA256

    5851f29a5a025970c7a4658d823a0245069c4137220220a064c39b05861dbf52

    SHA512

    b2fe77d90d2bce959b88da1f43bbd2720af8b48a6dc5da5072275c981a96a60aa0b7a1682a67b0050b0a093037cf3978e3ee367f18747ab52d3f3c09655df0d9

  • /data/data/com.dehodigipuhixoyi.mafuko/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.dehodigipuhixoyi.mafuko/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    d0ca3c49fe49478afbad92d10720b942

    SHA1

    cf679f2c808625f5fba7faeb51f015c325cc8827

    SHA256

    5ba4723af110ef60c11a4f6d950eb17d2c735b61e788c0e656cf10235fd9c32e

    SHA512

    ab9487a0ef7cca1de5caca6016f2e3ec806eb1decd988fa863baafbe3e030109d98eede0d4e18db7d8718a4540179d8f8445636583760e857b5a8b6be761a5bd

  • /data/data/com.dehodigipuhixoyi.mafuko/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.dehodigipuhixoyi.mafuko/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    ff3146430d0804ed1597eff6deec398c

    SHA1

    5b832ec8f442c4996391929fd71b32d86244ff2b

    SHA256

    e76af5888ba92f6a3c5f02f45cdfc72548b3042935433c693e0893504071e7b8

    SHA512

    0ec3b44eb89673b16a2b75e3d60023c07b24e8e1722c19a77aa181a920f5c2419880932d737f3d2b9ae04d8d089511acb0d32e21451912b8e2cc344801b284d2

  • /data/data/com.dehodigipuhixoyi.mafuko/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    7e2434e8386a723b75759a4a491d06dd

    SHA1

    65efe8e8cd8e89e666092fbe69e965d7bcd5407c

    SHA256

    c711fb034b7e02e28247041f5e84046eb770a626f64f8fc20d7b2fc56cf1d304

    SHA512

    c6137c7f4aa2dd067026e9b5da63c978bc5a77626119caf535d56a077b12ebfbf5253f2c92cbe96baa1c4cc5898e7587953c2fad506edb7757e622da7c44940a

  • /data/data/com.dehodigipuhixoyi.mafuko/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    1522256695762c2bbb15796ecf1aa134

    SHA1

    a64cbf82219f931f288e4957fd581e80bd609550

    SHA256

    c14c5085a24a728e8c193a9d54789bda9e453449487961c48d3700508795d3fd

    SHA512

    03ffb82e720d99e9bc9aaa116a8cc304ca2b3c2acc42071ab4dea4e3c3b602367aeb2c2eb9de11959eb1cba7d1f0ff3c269515eaaddb2935facec6ae97866bf9

  • /data/user/0/com.dehodigipuhixoyi.mafuko/app_night/inc.json

    Filesize

    1.7MB

    MD5

    1d33f152976a39caa123d6399591af9f

    SHA1

    9d50b41860d66a5750d88ca2cab5d8bc1e20037f

    SHA256

    e84dc462be898347a130e7b3afe4e9eaa8a5f8b3a393aeb9d96e239aa3c1ac1e

    SHA512

    d79e49c0a219e4385aec259cbe21577f41e846215515a91d05835c821f9f91c7d5b23f9ce1f8ae57565afe7a19043b332eda48ec929a309e80882dc556bb373d