Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    10-12-2024 22:05

General

  • Target

    a853acc5980a78a38ca9fcae6af28ee5f7d3b340bade3100662c0513900ad886.apk

  • Size

    3.9MB

  • MD5

    2fc13d55c51d99bbef6dfc84635560fb

  • SHA1

    253239489f7d8c255f55311c34a368870c556d5b

  • SHA256

    a853acc5980a78a38ca9fcae6af28ee5f7d3b340bade3100662c0513900ad886

  • SHA512

    46cc5cc214d184418f90c22c209b7adbf4b40236f3182bff50bc60559fb8b86b4ee3d06c26b79d3d447322a5796bafcf3e04d6e5e5a314f57d780b42bc323272

  • SSDEEP

    98304:HJYWxHpGMbWrEvSt5p3EPY5Noig1aSRXS6UC8NCow:pd1IMbWgv+LNvg1h1YC8NCow

Malware Config

Extracted

Family

ermac

C2

http://154.216.19.93

AES_key

Extracted

Family

hook

C2

http://154.216.19.93

AES_key

Signatures

  • Ermac

    An Android banking trojan first seen in July 2021.

  • Ermac family
  • Ermac2 payload 2 IoCs
  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.numberfasf.StickerArtadxjl
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4261
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.numberfasf.StickerArtadxjl/app_merry/UtlQr.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.numberfasf.StickerArtadxjl/app_merry/oat/x86/UtlQr.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4287

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.numberfasf.StickerArtadxjl/app_merry/UtlQr.json

    Filesize

    735KB

    MD5

    0e0fd09fa3c1228b3c2e0f9efb861334

    SHA1

    48a25078ffd892c7a99e8d5e019783b4a6013a4a

    SHA256

    1519d19e3ab47fd0b3fffeea53825f3e533853ee05e9e92fb01abb6cda2a0aab

    SHA512

    f731f1a8c69375a69678b6268bf8e460fc8f079dbcc3b7cc72ae047c25be8c74d4813f427643923cb5985f11ee9d1873988f9811fae3aa7b4d8fc70336572906

  • /data/data/com.numberfasf.StickerArtadxjl/app_merry/UtlQr.json

    Filesize

    735KB

    MD5

    47e0aa5a0d10546fe71fc2e75a69fc6c

    SHA1

    2006ae37058d20484a4d2b2396883c94d111773a

    SHA256

    bc443e6f9dd366d3fc31ae6c5be33e4ef7c351659e9c2d60126bab6bea85eb84

    SHA512

    b635f3bc71a63108c8aad9c6be8e8904f112d1dd7e09ccad31b05de8ea5edc904334c3c0334142a48377c1a04b357f932c9e54e3e0e70eea9d45647e42aaa410

  • /data/data/com.numberfasf.StickerArtadxjl/app_merry/oat/UtlQr.json.cur.prof

    Filesize

    3KB

    MD5

    c07f11ff392e6ffac50073155f90c161

    SHA1

    513bb8989bd53e0b4c40b29a24bc939cc45a0225

    SHA256

    f651d3a1e81017eb3aa7e97910086f4989f3ae103f6a7dee6ba36ff5ab18d120

    SHA512

    e856e1451f395d5b5d288995088eb1b4dbd4cb54af1f06269d3a6f7ba86090a02c41f64b5f03ed1713c1bc94e843f6585b7dfeec502f18d4b9b9a4740d861481

  • /data/data/com.numberfasf.StickerArtadxjl/app_merry/oat/UtlQr.json.cur.prof

    Filesize

    3KB

    MD5

    d4265d919342fe3552b11166c9ee82e8

    SHA1

    d387bc1b099fd537ea025cbddfb103d16f8d4396

    SHA256

    283e9bdd6ddabcf35b216546ef9ccb31c3402bc4c1a319c048899d50904075b3

    SHA512

    de32ebf25ab2e9d54d355018f6525bbe89f444ead9a297aa72fe845a0f18498a667a4cf8cdf947a812b9ced4ce923b896387df2466c4caee83cd27da28997110

  • /data/data/com.numberfasf.StickerArtadxjl/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.numberfasf.StickerArtadxjl/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    4b5b2ea66188376e610fd689dd998489

    SHA1

    a2d75aafb1ee40b0cfc5a9aef91da5c1a695e15c

    SHA256

    acabc793264e5fd73b1bc6b857a358c7077f3a8e62e1bc76a3a61fe126b98d44

    SHA512

    9bb73572af4e1fc11245e452d02cff03cb98ff65d84ee945c5b5ec0570bbe573ff2af66e7d1699a5aa3b1724d0bc100aead8c4072fdd786c04e8ea6596330c1a

  • /data/data/com.numberfasf.StickerArtadxjl/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.numberfasf.StickerArtadxjl/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    e4ca9f5ecbfc17fdafad14586df1b80c

    SHA1

    91d8c3c69db74516b3b65d8e484be4e478d3c16e

    SHA256

    bd43585fcb6d776d16b607f3758e30a79a8da5898479234b14a2c111d1ad1c84

    SHA512

    229816906054fd85e0dcf9b487cac5d58f6543b60953d200ca88c81c9a1d21f7be9d4e97b93bf9a4b2099a20733517696511046c491c0ea0523c0dead7515f8a

  • /data/data/com.numberfasf.StickerArtadxjl/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    02a6e0f2bcfc63818cc885da7c767259

    SHA1

    7fa0a736b3855f1cb475362d96f13f38cfa915ed

    SHA256

    1363a5836d627104c2e4ca6f15a0e5c8b66dd994cbd047e62414479ecded29d0

    SHA512

    6957d6bc776f18e47cf909aee9eb9e75bd7989ef9728aac80ac24fc532fbfe8aee9a2d92bf3a15011323f9d971cc14f2a38332447ef7b0be525ce8a41f1b3e7e

  • /data/data/com.numberfasf.StickerArtadxjl/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    416cd8f13af42a9043d42ad9565f10ce

    SHA1

    8a53526b53eb2f6266f1b8cc94ee55be9ec0a6fc

    SHA256

    3db077f3daea190d5f264a3464a157471cc67a1332f770cf8138caf300faef47

    SHA512

    5c15bbc2b5afa3c507ccc3206e7ae3d1db000c7bff1ca48699c249160925508f95b0eb91930d4426c430829d31ce2625f6b44b3a9669391826ca34bb4798493d

  • /data/user/0/com.numberfasf.StickerArtadxjl/app_merry/UtlQr.json

    Filesize

    1.7MB

    MD5

    abf19c4cb9c04e4a4e8ec697959d94d0

    SHA1

    10ce63ad3f5b92e5407ba75d38990138527bff51

    SHA256

    357d9385e6c3bef852478a49c40359e7b2ea155c95785964a865b91c4095de9e

    SHA512

    ab0cfebbda31fc5a16b6c2caea6fbd6b5ee0d13eb810bd04c99f02d61a23ca82182d3f7a1b6e9c8e20c741fc8dc691018ae18ccc9731970f6eacba323d636354

  • /data/user/0/com.numberfasf.StickerArtadxjl/app_merry/UtlQr.json

    Filesize

    1.7MB

    MD5

    b99c671f34e13773893a5ce44c7f43a7

    SHA1

    818419a336a3e0f17572cdd1f0d363eb005c8de6

    SHA256

    ae6b6c994ddb5b9ef0329de8aab60028743842de3b1717479b2d91835ec17a58

    SHA512

    ce80e7ffce3a1e2385f886d2b9fbfb7eec88b7e5f76e25abfaa6e6601ceeb1c3b01f8e91dda2b9d9d5de06b122a4523a867262a402461261d191df628074c667