Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    07-12-2024 22:05

General

  • Target

    2940ce672f530b77d0e8aa234d13e371ec8b12e8cdc7d67bac2e7634726659b4.apk

  • Size

    3.2MB

  • MD5

    528948b21f1f84f755107b3c235925d6

  • SHA1

    1d848bc442155eec20c5fecb98bc0a23565f0eec

  • SHA256

    2940ce672f530b77d0e8aa234d13e371ec8b12e8cdc7d67bac2e7634726659b4

  • SHA512

    3854af4b672e43ed14bf3f603951836a7771a53ca9d0e7924c51e5f4f38c8724d9562946194499c866ab9ae649382f3c54740388b3894ba85224d1949308809c

  • SSDEEP

    98304:YPr8QZMVEiQhZB12NcXUS90vNnMUzqrkZ9xzOsoCOWs3Sdsq:8ZViy4kUC0vL1ZDasxs3gsq

Malware Config

Extracted

Family

ermac

C2

http://154.216.19.93

AES_key

Extracted

Family

hook

C2

http://154.216.19.93

AES_key

Signatures

  • Ermac

    An Android banking trojan first seen in July 2021.

  • Ermac family
  • Ermac2 payload 2 IoCs
  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.kahveonay.marka
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4337
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.kahveonay.marka/app_regret/Dya.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.kahveonay.marka/app_regret/oat/x86/Dya.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4365

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.kahveonay.marka/app_regret/Dya.json

    Filesize

    736KB

    MD5

    631fac78b3aed09bdc8573dd15a98c68

    SHA1

    9fb111d105aaf0374e6245c53a65a238e487f3ab

    SHA256

    14ea42a18646e494106e5bb55802c9d68a16ed4243ed8d9c8c5ee77f430f763c

    SHA512

    0559abacc0d5bee6a751fb5d89c18f168489210c8ac85933c35d278ee432b1faba649d8edd0182ac5e670a6a66f90fa983ceacbda8fb47898e62b2467121a2f1

  • /data/data/com.kahveonay.marka/app_regret/Dya.json

    Filesize

    736KB

    MD5

    fc6b35d315f4db9d5a10c9b40d63025f

    SHA1

    0680d4ef9e7c95a8ab798367f078fb3fe2a8f47a

    SHA256

    88e124126ed6f115673a1e75ddbf047a7d9781f7ebf1e6a5b5ad8de275f6929e

    SHA512

    d42ff7eca23939076cf6b872db8167d5b774eae639a082cdcdf7d705dc89ea451eeccd60e27a2102270e4f324b71b89136c66662283412cb572a93b74d87c517

  • /data/data/com.kahveonay.marka/app_regret/oat/Dya.json.cur.prof

    Filesize

    3KB

    MD5

    0f5825f7ca14fb4418aa6c7a6c7ed2db

    SHA1

    97ca2d7601417eb9b21ce1b1674131db16d0c115

    SHA256

    8756ed4ca6bfcce789037c38bdfb7e0e9062f891ab1f9cb9bd6144dbca97b342

    SHA512

    de99d9177de71325a8519c8d7a9fe987beb54c9f383129a891d40c14a5585024bafb75f1536e4f96d834c47f82d8134e59e4f953bc7b7686f3de18b6a2ba2123

  • /data/data/com.kahveonay.marka/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.kahveonay.marka/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    c8b4d8ca4901413643c4717a37d5a5b8

    SHA1

    f25fc6ba1b4315bdf9bfa21f394774855bdeb917

    SHA256

    44d1046573a5e7fdefb904becb36c3e2f81d363c60c2dbecabb49f461a18ea3a

    SHA512

    87d950f805ca6478663885bf3cdbb50d5461646f5d3b7b76c41381c80c187ead0e8df833bf271eb02e80caea6732d91cfbcf426dac74e7dd635eeb00b3f9f0f0

  • /data/data/com.kahveonay.marka/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.kahveonay.marka/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    293f98298a34ec8bdd00a14ab6b33336

    SHA1

    9110c8d3ebbc3e4119965f248cef965d1c692d58

    SHA256

    2e47785b2842964c6215be79f880645ecae30f8f224c2466c7ed2a4aa08bc90b

    SHA512

    c7bdeb274c180678d1341ae240e748a4801498070f8bca06eaa283d6deb2b6ddda02056c0750ef1c3dbfeea441dbcb2927a7299ad609247aac574bb5b19ebce9

  • /data/data/com.kahveonay.marka/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    66be6562d37ba0740e0ff092e9462f8e

    SHA1

    013631648bc7f5bfd1e4a5f6f1924ed03d2369fa

    SHA256

    baf3ea8d3d72538546674caf9f2f9ccc5183ed7cf08580ee57bc37bbca9098e5

    SHA512

    935199768b75f316fa44f5f9d49ae49a01fba2e9a0321e06c4a456cb77226421d296b4335bcb032d9a4f072f613b93a366ba246a97bda30a278b30ad6c1333d0

  • /data/data/com.kahveonay.marka/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    e4cbda20e182b106ac05a3c6d1a576e7

    SHA1

    e214b5a77122c1940fd07699e778e2ae05a52402

    SHA256

    a39fcff30b0696c7e162623fdffbe524dc732f868166636a9b3731d6900be2e0

    SHA512

    ee6e56dba2c71834e3164812c08c1267d22b25d5e97044a966d89d77f309b18a0a30a815143f9f5bf788aed9a77e363f619a4a15d989bfd7491ca4ab4e5c17f3

  • /data/user/0/com.kahveonay.marka/app_regret/Dya.json

    Filesize

    1.7MB

    MD5

    b1c17cf603459bf3cde6792f1872c25f

    SHA1

    245bccea23df07e47832356ffb6c240eb39f27c5

    SHA256

    54f16fc7e7fa880f6bc4a47d206a1d2d50dad83166f60001e225ed8c8203b533

    SHA512

    5b7d5e7adeed8b48f36afe7c29c0ef03493257eb87e1bb51fc109278d154e5277cf46bc8e13d296ea0fb49375c5e48a82f954a527375827777d9456152b5c455

  • /data/user/0/com.kahveonay.marka/app_regret/Dya.json

    Filesize

    1.7MB

    MD5

    c16331a931011722a8a3f4110d016935

    SHA1

    da0ee471f9918f2f4237b2b8c4b312493e7c208c

    SHA256

    0ed058b78dfc76d8250582cf41a2fc98c51ec7c7ad378c820e13d8d8c732b74a

    SHA512

    18d9f1c63a4fce491fe10f4d8c0a735544fd0a6d26585ae7311e2daaebcbd34c8e6694285b7d637213a56a986b3dfc0de3f39986e9eded86b5d4fb47c4fdba5d