Analysis
-
max time kernel
149s -
max time network
158s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
09-12-2024 22:13
Static task
static1
Behavioral task
behavioral1
Sample
099f844f6e9ddc1754bedf2f389e24d2794c85d3bc68adb176465b4d4968553c.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
099f844f6e9ddc1754bedf2f389e24d2794c85d3bc68adb176465b4d4968553c.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
099f844f6e9ddc1754bedf2f389e24d2794c85d3bc68adb176465b4d4968553c.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
099f844f6e9ddc1754bedf2f389e24d2794c85d3bc68adb176465b4d4968553c.apk
-
Size
3.4MB
-
MD5
f7506baec8f59f427f839f9ff1f0bfdb
-
SHA1
08827dbbaf7a1067179810b48512973a1b2e8446
-
SHA256
099f844f6e9ddc1754bedf2f389e24d2794c85d3bc68adb176465b4d4968553c
-
SHA512
23239a09a45c2c884c06352eb705839b5c4bde62dabe18605a9de23fa6f0b5449978c9df0b37b65034fbd2a4fdd2c5965cc0397eea36d1459686b1cc884b4e0e
-
SSDEEP
98304:t1re8MfHbkaqYsvDJE7D1MZIyRPQru8x1MnaWa/B:m7vbFUbxQru8wnaWCB
Malware Config
Extracted
ermac
http://154.216.20.102
Extracted
hook
http://154.216.20.102
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac family
-
Ermac2 payload 2 IoCs
resource yara_rule behavioral1/memory/4246-0.dex family_ermac2 behavioral1/memory/4218-0.dex family_ermac2 -
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.mahabadlar.maruko/app_emerge/QrJR.json 4246 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.mahabadlar.maruko/app_emerge/QrJR.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.mahabadlar.maruko/app_emerge/oat/x86/QrJR.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.mahabadlar.maruko/app_emerge/QrJR.json 4218 com.mahabadlar.maruko -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.mahabadlar.maruko Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.mahabadlar.maruko Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.mahabadlar.maruko -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.mahabadlar.maruko -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.mahabadlar.maruko -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.mahabadlar.maruko -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mahabadlar.maruko android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mahabadlar.maruko android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mahabadlar.maruko android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mahabadlar.maruko android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mahabadlar.maruko -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.mahabadlar.maruko -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.mahabadlar.maruko -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.mahabadlar.maruko -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.mahabadlar.maruko -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.mahabadlar.maruko -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.mahabadlar.maruko -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.mahabadlar.maruko
Processes
-
com.mahabadlar.maruko1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4218 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.mahabadlar.maruko/app_emerge/QrJR.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.mahabadlar.maruko/app_emerge/oat/x86/QrJR.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4246
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
735KB
MD5e672d159042deb9b092939a60026e265
SHA10723f483dd4bd870d5ce37055bd694ecb44d1684
SHA256f2dba67a5ca79b599ef2cf45c677a0e8eec36b64e951101ef7f4ac4252e4c952
SHA512aeae98e77d41b5f65fc594c0a36681134607d142de7a50683b7f93e9f848d2542aa86a4a75fa2751fdb63803b5c5874ccdc2adcc054a0297c5af31e06a1029d8
-
Filesize
735KB
MD5ab306c66832dbee950cd8ce2752aa334
SHA1a18431001db9eeb4e9bc09a2e95b63d99476ec09
SHA2566ce3e938e15e0860d07fa4cc3590bde4f1de53c527de0dc3f6d5304628057477
SHA512bead139d6141a94078752116c75e75d156413c8d6f860719f8fa5807f972f9d2acd52f21184c6fa7684626483743f77f27edec9f2bf31f94abecd31ffbbea35e
-
Filesize
2KB
MD55195f7141d7f59562d7f3469cbb1f54b
SHA12fc914e71acf678053a1a05c04cbaec0aecb3271
SHA256d6c8670207a378afad1b5723e93ec564eb21dd356c5660d2e5ef952307adfe97
SHA51248493c6b2241bc2f653c4c557eafbb88b81e5d5bf9221a2d436dec2fb3196d3f963efc76db24c3782d85f24c88b504f300beb9cee9794af773b0f8df2f661ee7
-
Filesize
2KB
MD5fe61b37da7f7c587db49a745574bf29d
SHA1cc8d11ce5119cbb89a1bf39429318f65c79743a1
SHA2561c15efeb8897b8a13cc589c920cab7ba5682c7ec8433f8e23bceb2701d30fc6d
SHA512f9e2b51d2124c00c443aaa60ead122a18fedd554ee3fcf56df8ee7b5520bba64ef6315dd92a044a5bc1151943c61e12ae86d924345de0132a47e698739d28ad1
-
Filesize
3KB
MD51c7f49db5e53275095e55eb131e29fb1
SHA1438596e805f8720bfe17d835469124045e347417
SHA25614965197de33bec2810c209d2d05d8dea1aad84417dea0653f9682fb5f0e762c
SHA5122a16d0bbd015faeee55ff9e785c96425d7c814203fb930b83b8b7422e48b91a8e71560d84f1290533e847586f90b0c30c1666583ac0f95a3f7cec20bbe66a21f
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD51484fd1ffcb842ad883c939f6abea525
SHA16089153501469c41fbfec5d5c01afe03c112dda6
SHA2561f33454b792838cd5e928cc9362933e661676f6bf0265dcd82b1d6be6a8939a0
SHA512aee042b0cce1ee796c1a03b9346ebbf5d6dc0e275fbb0467f94645ddb501b96292a62f41b2ab268ede36e67b4489449258dbbafae997bcc110b40acdfda1ee8b
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
108KB
MD51a6ae6b0179a99b1208f32b757874366
SHA10c9c5a1e9019e285a9eec25d3056aec84340cf0e
SHA25685cdf3e3b8afaf12022b04553ad3a96670f93b829833896cb2f3e148143de296
SHA512ce80a65ed482bf8f0697d9a765c7fc0798e945dcbf85e6c91a22d873e19b4266831c1b15600ee6925a3f10e372b5ac4eb70a6889eb190cd48bf102289da9daf2
-
Filesize
173KB
MD58c255b8ca29b657779feb5899397e276
SHA1c99052eaf858cd7e5cefd04ad2a6123e4d4bf3ed
SHA2565c06c50f9b4dca320a22697b3de3c05140c36bae904159008c605c4dd1ded58a
SHA51250e0b76069eba667d69dbb11d0c8c15ea694bf462dad07a3fa2670acfec1bac3a2184615a7c1c7388b051557bb7ffde605e398218f2e0ee378cddb209e475eab
-
Filesize
16KB
MD5e9ab1ac28be83d8205e24884ac9a4a53
SHA142e5792d0db82c8a0cba802ce0dc3dfba2be5b1e
SHA25619566282c94e93787807236670b5d112d0b566aea6bcc057a43e65e7154c4081
SHA51225010b93791a38b842a35ccc20d0ae3829f27a632e05b7bdce9da7a92effbe12ae707da6d9d077b70561c88e420f7b6a69b2827458900b4311e031bfcbfe3efe
-
Filesize
1.7MB
MD5ac1a36e087a4f1f5116c8867f7221e73
SHA1008e028b7a56864773ec393bd7ad3a955b31dbfe
SHA256be2b50437398d4af8eccc33a42f42b0419a62c606b45bb0e09a619ce09920064
SHA51278a52d81c343ae7790048be25c5916d435ab1978baa2a5c9dc15226c9b154b2143d4a54ecf008fd7cf9d4ae9000f4c759b9052e98e5a04b235728524084a4d3e
-
Filesize
1.7MB
MD5dd139ea50df6f15f4fd6ef669b88fe93
SHA1014a8feb780e713bbdb83bf7d2b0ffaace444a89
SHA25606ce1d32cfb90bc763f69618a4d23759e5a61705599dedc2a64f6fcf4b8e7a4a
SHA512d073eff575460d171d75d0795516ce3addd46669a909903b0baf515e74b50a72c218d0bb952f4c47cb1c05c3b296f0e94e235660b8e61dd51444bf5ce6948603