Analysis

  • max time kernel
    149s
  • max time network
    158s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    09-12-2024 22:13

General

  • Target

    099f844f6e9ddc1754bedf2f389e24d2794c85d3bc68adb176465b4d4968553c.apk

  • Size

    3.4MB

  • MD5

    f7506baec8f59f427f839f9ff1f0bfdb

  • SHA1

    08827dbbaf7a1067179810b48512973a1b2e8446

  • SHA256

    099f844f6e9ddc1754bedf2f389e24d2794c85d3bc68adb176465b4d4968553c

  • SHA512

    23239a09a45c2c884c06352eb705839b5c4bde62dabe18605a9de23fa6f0b5449978c9df0b37b65034fbd2a4fdd2c5965cc0397eea36d1459686b1cc884b4e0e

  • SSDEEP

    98304:t1re8MfHbkaqYsvDJE7D1MZIyRPQru8x1MnaWa/B:m7vbFUbxQru8wnaWCB

Malware Config

Extracted

Family

ermac

C2

http://154.216.20.102

AES_key

Extracted

Family

hook

C2

http://154.216.20.102

AES_key

Signatures

  • Ermac

    An Android banking trojan first seen in July 2021.

  • Ermac family
  • Ermac2 payload 2 IoCs
  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.mahabadlar.maruko
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4218
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.mahabadlar.maruko/app_emerge/QrJR.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.mahabadlar.maruko/app_emerge/oat/x86/QrJR.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4246

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.mahabadlar.maruko/app_emerge/QrJR.json

    Filesize

    735KB

    MD5

    e672d159042deb9b092939a60026e265

    SHA1

    0723f483dd4bd870d5ce37055bd694ecb44d1684

    SHA256

    f2dba67a5ca79b599ef2cf45c677a0e8eec36b64e951101ef7f4ac4252e4c952

    SHA512

    aeae98e77d41b5f65fc594c0a36681134607d142de7a50683b7f93e9f848d2542aa86a4a75fa2751fdb63803b5c5874ccdc2adcc054a0297c5af31e06a1029d8

  • /data/data/com.mahabadlar.maruko/app_emerge/QrJR.json

    Filesize

    735KB

    MD5

    ab306c66832dbee950cd8ce2752aa334

    SHA1

    a18431001db9eeb4e9bc09a2e95b63d99476ec09

    SHA256

    6ce3e938e15e0860d07fa4cc3590bde4f1de53c527de0dc3f6d5304628057477

    SHA512

    bead139d6141a94078752116c75e75d156413c8d6f860719f8fa5807f972f9d2acd52f21184c6fa7684626483743f77f27edec9f2bf31f94abecd31ffbbea35e

  • /data/data/com.mahabadlar.maruko/app_emerge/oat/QrJR.json.cur.prof

    Filesize

    2KB

    MD5

    5195f7141d7f59562d7f3469cbb1f54b

    SHA1

    2fc914e71acf678053a1a05c04cbaec0aecb3271

    SHA256

    d6c8670207a378afad1b5723e93ec564eb21dd356c5660d2e5ef952307adfe97

    SHA512

    48493c6b2241bc2f653c4c557eafbb88b81e5d5bf9221a2d436dec2fb3196d3f963efc76db24c3782d85f24c88b504f300beb9cee9794af773b0f8df2f661ee7

  • /data/data/com.mahabadlar.maruko/app_emerge/oat/QrJR.json.cur.prof

    Filesize

    2KB

    MD5

    fe61b37da7f7c587db49a745574bf29d

    SHA1

    cc8d11ce5119cbb89a1bf39429318f65c79743a1

    SHA256

    1c15efeb8897b8a13cc589c920cab7ba5682c7ec8433f8e23bceb2701d30fc6d

    SHA512

    f9e2b51d2124c00c443aaa60ead122a18fedd554ee3fcf56df8ee7b5520bba64ef6315dd92a044a5bc1151943c61e12ae86d924345de0132a47e698739d28ad1

  • /data/data/com.mahabadlar.maruko/app_emerge/oat/QrJR.json.cur.prof

    Filesize

    3KB

    MD5

    1c7f49db5e53275095e55eb131e29fb1

    SHA1

    438596e805f8720bfe17d835469124045e347417

    SHA256

    14965197de33bec2810c209d2d05d8dea1aad84417dea0653f9682fb5f0e762c

    SHA512

    2a16d0bbd015faeee55ff9e785c96425d7c814203fb930b83b8b7422e48b91a8e71560d84f1290533e847586f90b0c30c1666583ac0f95a3f7cec20bbe66a21f

  • /data/data/com.mahabadlar.maruko/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.mahabadlar.maruko/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    1484fd1ffcb842ad883c939f6abea525

    SHA1

    6089153501469c41fbfec5d5c01afe03c112dda6

    SHA256

    1f33454b792838cd5e928cc9362933e661676f6bf0265dcd82b1d6be6a8939a0

    SHA512

    aee042b0cce1ee796c1a03b9346ebbf5d6dc0e275fbb0467f94645ddb501b96292a62f41b2ab268ede36e67b4489449258dbbafae997bcc110b40acdfda1ee8b

  • /data/data/com.mahabadlar.maruko/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.mahabadlar.maruko/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    1a6ae6b0179a99b1208f32b757874366

    SHA1

    0c9c5a1e9019e285a9eec25d3056aec84340cf0e

    SHA256

    85cdf3e3b8afaf12022b04553ad3a96670f93b829833896cb2f3e148143de296

    SHA512

    ce80a65ed482bf8f0697d9a765c7fc0798e945dcbf85e6c91a22d873e19b4266831c1b15600ee6925a3f10e372b5ac4eb70a6889eb190cd48bf102289da9daf2

  • /data/data/com.mahabadlar.maruko/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    8c255b8ca29b657779feb5899397e276

    SHA1

    c99052eaf858cd7e5cefd04ad2a6123e4d4bf3ed

    SHA256

    5c06c50f9b4dca320a22697b3de3c05140c36bae904159008c605c4dd1ded58a

    SHA512

    50e0b76069eba667d69dbb11d0c8c15ea694bf462dad07a3fa2670acfec1bac3a2184615a7c1c7388b051557bb7ffde605e398218f2e0ee378cddb209e475eab

  • /data/data/com.mahabadlar.maruko/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    e9ab1ac28be83d8205e24884ac9a4a53

    SHA1

    42e5792d0db82c8a0cba802ce0dc3dfba2be5b1e

    SHA256

    19566282c94e93787807236670b5d112d0b566aea6bcc057a43e65e7154c4081

    SHA512

    25010b93791a38b842a35ccc20d0ae3829f27a632e05b7bdce9da7a92effbe12ae707da6d9d077b70561c88e420f7b6a69b2827458900b4311e031bfcbfe3efe

  • /data/user/0/com.mahabadlar.maruko/app_emerge/QrJR.json

    Filesize

    1.7MB

    MD5

    ac1a36e087a4f1f5116c8867f7221e73

    SHA1

    008e028b7a56864773ec393bd7ad3a955b31dbfe

    SHA256

    be2b50437398d4af8eccc33a42f42b0419a62c606b45bb0e09a619ce09920064

    SHA512

    78a52d81c343ae7790048be25c5916d435ab1978baa2a5c9dc15226c9b154b2143d4a54ecf008fd7cf9d4ae9000f4c759b9052e98e5a04b235728524084a4d3e

  • /data/user/0/com.mahabadlar.maruko/app_emerge/QrJR.json

    Filesize

    1.7MB

    MD5

    dd139ea50df6f15f4fd6ef669b88fe93

    SHA1

    014a8feb780e713bbdb83bf7d2b0ffaace444a89

    SHA256

    06ce1d32cfb90bc763f69618a4d23759e5a61705599dedc2a64f6fcf4b8e7a4a

    SHA512

    d073eff575460d171d75d0795516ce3addd46669a909903b0baf515e74b50a72c218d0bb952f4c47cb1c05c3b296f0e94e235660b8e61dd51444bf5ce6948603