Analysis
-
max time kernel
143s -
max time network
156s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
06-12-2024 22:04
Static task
static1
Behavioral task
behavioral1
Sample
e846b946cbab21b079a1182755b839a9bc61b41f7bed952c97ae479f12b05794.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
e846b946cbab21b079a1182755b839a9bc61b41f7bed952c97ae479f12b05794.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
e846b946cbab21b079a1182755b839a9bc61b41f7bed952c97ae479f12b05794.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
e846b946cbab21b079a1182755b839a9bc61b41f7bed952c97ae479f12b05794.apk
-
Size
3.3MB
-
MD5
bd93c2e47f79af38bfef2e711cc28efd
-
SHA1
fc428b58e7a9b453485b952c57e3d7be935f727b
-
SHA256
e846b946cbab21b079a1182755b839a9bc61b41f7bed952c97ae479f12b05794
-
SHA512
9068717abce4acef7891a73e5c8b60ac465bc6f0aff4e9c3dc7b7163b1d42a0a258d5cb5f15f6cb8ca28b9ead84e98c7cfb2279d08986660569075f80332f8db
-
SSDEEP
98304:4dyQqijKxNlw2+Loz9RCnoQAxgddnG1dE5:qyQdjKx3CUxsoQ5PnGvi
Malware Config
Extracted
ermac
http://154.216.20.102
Extracted
hook
http://154.216.20.102
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac family
-
Ermac2 payload 2 IoCs
resource yara_rule behavioral1/memory/4292-0.dex family_ermac2 behavioral1/memory/4265-0.dex family_ermac2 -
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.mahabadlar.maruko/app_catalog/Qx.json 4292 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.mahabadlar.maruko/app_catalog/Qx.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.mahabadlar.maruko/app_catalog/oat/x86/Qx.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.mahabadlar.maruko/app_catalog/Qx.json 4265 com.mahabadlar.maruko -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.mahabadlar.maruko Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.mahabadlar.maruko Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.mahabadlar.maruko -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.mahabadlar.maruko -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.mahabadlar.maruko -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.mahabadlar.maruko -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mahabadlar.maruko android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mahabadlar.maruko android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mahabadlar.maruko android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mahabadlar.maruko android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mahabadlar.maruko -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.mahabadlar.maruko -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.mahabadlar.maruko -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.mahabadlar.maruko -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.mahabadlar.maruko -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.mahabadlar.maruko -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.mahabadlar.maruko -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.mahabadlar.maruko
Processes
-
com.mahabadlar.maruko1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4265 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.mahabadlar.maruko/app_catalog/Qx.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.mahabadlar.maruko/app_catalog/oat/x86/Qx.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4292
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
735KB
MD5dc3aff9d4d4af2e82f2f95cb1ebcb638
SHA17c507a664fe7764f151f8dd847de0658ab0f0934
SHA25645498224c343fffca78b0372183ae6d2386494809c3a6653e823691010f4f90c
SHA51295612cef41570dd873224da933516b19b2e54aa2505542a51f562175fe084ff7fef75248f27fb168b5554b634dd3b7eb0acf0eb72fb48ef8191aa52ff3b967c2
-
Filesize
735KB
MD553571e1e60325874d1ce95b4ee7ead97
SHA12487d6b852e59753be4fff382cdcdfc8b7a154a4
SHA256eacdf955c6020e1be0910f9fce376b200bcf32c79be80f0b910baab67ce9c5c2
SHA512e2edeabe76fab43b53788d70a63616be2d7ba2c319ae8e498050438a2d1aa5f7649b7bbcf1a5bc8c5f2d3519a7de9d37020663a02bc31ed3acce623c88866900
-
Filesize
2KB
MD5dec2f5803992a989dc8672ca90ec854b
SHA1bb74f92672ca331b7adde56685f214aece62900c
SHA25678d38a0759c2192defbea73f4c41a913f88444ef750815cf0c734cc10f3412f2
SHA512ae11c4407d7faa7047cf4c658a830596ce01ef8c9f2089cf21cf4ab661531c55bf3378d88af52be3084eb4972a94ebaf8b4f215e5b6a6abba1f926aab0a95496
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD53131343b1c9ff6e7e548de430da4898b
SHA1970156398f6fa5bd467b9892268066ef65ffb565
SHA25695d216d57b8326916868fb3a43fd99b49a01f70646a9fac3c97abe09582f526f
SHA5124f1f82c7b76bc76eff8bbe613eb0044079ea258fe8b2bd0502146a7ab33c9a3f06b539fed5079402d9d4408cf1ae1e5fde1b86fadeba7c33218ace13557d889b
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
108KB
MD52896662a6277859e693288954ad3ccfd
SHA1dcc1a3a424117ad683155054ea7376b1f8cee354
SHA256b18ef540b1c1b132fd543108fe0798b506dd8fbd1cf0e7405ea77c8491993871
SHA5129e73949c3ec2fbd1bbc7406eae10fd87d0617aebc021715e6f95321aaa2219aa38140ed40ae353f4eaa77605e2fb43a61dac45200955195cc699365521bc9520
-
Filesize
173KB
MD5b8924dac744c1021ac85b1218854282c
SHA130b8f747b8557c2937dc8f3a92459ea33c0646c0
SHA256a6574e2ff5c762b10a9920d0c4b385d4f00c68ad9a1f2d4a47c3dd7c21bb4156
SHA512e9becba2555dcc3e2c8bbb777d87b94d3730feff674beff31c2137fbab52a466dcaee82897c320c48ca4a81a17cc5348f8262164677926e393c632b794f64a62
-
Filesize
16KB
MD5124e4f7e3ad55229adbcafd85a7ea9bc
SHA1bea6f9b17f9248e7d1e5ed3bd2da42d5cdda1bf4
SHA256efc7b0cbe8523c941137eaa1d7f7d8b8aa282c00f6edc9842150a01fd081fd9e
SHA512fb6181cb4a2d37175525239e2ee6594bc496f335f2a0848fbdebe219cbca0ad0ffe76f683a634e8f3d42ecae54199f887b33c571ad674e8ac7171626441e9f4b
-
Filesize
1.7MB
MD5ac1a36e087a4f1f5116c8867f7221e73
SHA1008e028b7a56864773ec393bd7ad3a955b31dbfe
SHA256be2b50437398d4af8eccc33a42f42b0419a62c606b45bb0e09a619ce09920064
SHA51278a52d81c343ae7790048be25c5916d435ab1978baa2a5c9dc15226c9b154b2143d4a54ecf008fd7cf9d4ae9000f4c759b9052e98e5a04b235728524084a4d3e
-
Filesize
1.7MB
MD5dd139ea50df6f15f4fd6ef669b88fe93
SHA1014a8feb780e713bbdb83bf7d2b0ffaace444a89
SHA25606ce1d32cfb90bc763f69618a4d23759e5a61705599dedc2a64f6fcf4b8e7a4a
SHA512d073eff575460d171d75d0795516ce3addd46669a909903b0baf515e74b50a72c218d0bb952f4c47cb1c05c3b296f0e94e235660b8e61dd51444bf5ce6948603