Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    10-12-2024 22:05

General

  • Target

    a853acc5980a78a38ca9fcae6af28ee5f7d3b340bade3100662c0513900ad886.apk

  • Size

    3.9MB

  • MD5

    2fc13d55c51d99bbef6dfc84635560fb

  • SHA1

    253239489f7d8c255f55311c34a368870c556d5b

  • SHA256

    a853acc5980a78a38ca9fcae6af28ee5f7d3b340bade3100662c0513900ad886

  • SHA512

    46cc5cc214d184418f90c22c209b7adbf4b40236f3182bff50bc60559fb8b86b4ee3d06c26b79d3d447322a5796bafcf3e04d6e5e5a314f57d780b42bc323272

  • SSDEEP

    98304:HJYWxHpGMbWrEvSt5p3EPY5Noig1aSRXS6UC8NCow:pd1IMbWgv+LNvg1h1YC8NCow

Malware Config

Extracted

Family

ermac

C2

http://154.216.19.93

AES_key

Extracted

Family

hook

C2

http://154.216.19.93

AES_key

Signatures

  • Ermac

    An Android banking trojan first seen in July 2021.

  • Ermac family
  • Ermac2 payload 1 IoCs
  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 18 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.numberfasf.StickerArtadxjl
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4745

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.numberfasf.StickerArtadxjl/app_merry/UtlQr.json

    Filesize

    735KB

    MD5

    0e0fd09fa3c1228b3c2e0f9efb861334

    SHA1

    48a25078ffd892c7a99e8d5e019783b4a6013a4a

    SHA256

    1519d19e3ab47fd0b3fffeea53825f3e533853ee05e9e92fb01abb6cda2a0aab

    SHA512

    f731f1a8c69375a69678b6268bf8e460fc8f079dbcc3b7cc72ae047c25be8c74d4813f427643923cb5985f11ee9d1873988f9811fae3aa7b4d8fc70336572906

  • /data/data/com.numberfasf.StickerArtadxjl/app_merry/UtlQr.json

    Filesize

    735KB

    MD5

    47e0aa5a0d10546fe71fc2e75a69fc6c

    SHA1

    2006ae37058d20484a4d2b2396883c94d111773a

    SHA256

    bc443e6f9dd366d3fc31ae6c5be33e4ef7c351659e9c2d60126bab6bea85eb84

    SHA512

    b635f3bc71a63108c8aad9c6be8e8904f112d1dd7e09ccad31b05de8ea5edc904334c3c0334142a48377c1a04b357f932c9e54e3e0e70eea9d45647e42aaa410

  • /data/data/com.numberfasf.StickerArtadxjl/app_merry/oat/UtlQr.json.cur.prof

    Filesize

    3KB

    MD5

    ccde312edbbc075c494a686154bcf90a

    SHA1

    6bc1dd78da3bc2f2d24b5711bfcc5120a40e36c1

    SHA256

    3ca5a7176882ac31218f947c31b46741d644ab2dd821009256ab7431f4b68991

    SHA512

    707bcfebecaaf8ec0f354b89dc8c7ca12adbbaf8695ad8366394ea762612e50867fdff27a118e5bee206647089125ddd191c2fa26f2053a2f415387352a64d62

  • /data/data/com.numberfasf.StickerArtadxjl/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.numberfasf.StickerArtadxjl/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    0445dc222a734e53269fdba0316bb1f0

    SHA1

    3c1b49419e0a721b843ba26bbea7ba8edf2cc3fe

    SHA256

    9a3e0dd36e1e2111f18dfd0523610c4facd842dfc57a1d68b59cc63c73207c9a

    SHA512

    eee2113819a8e9792e7c7c79447ee2217f248ed1d9b361f3fa1b4d7b493e6b0f7cd6dc0e892131240e73aec303777e56a7c57c7ed4eae96c9b68cf305c2d4fba

  • /data/data/com.numberfasf.StickerArtadxjl/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.numberfasf.StickerArtadxjl/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    cacedae9ca20c1844f626a8b607c117e

    SHA1

    1777cc56d63456b55d91ab52baa698df8c6fade1

    SHA256

    04c8e26428e36342d68d8301283ae6e68ad99eb9caba1c9138d9ea62e1ce3504

    SHA512

    d1243bcbf7def48e1e298f2890107e7fa1a8e6cf7692c7a42b848eec53eaff06e92e949e7fecc69bdd31c29f9a0ff1fd62cbef19b2fb56b6570a5c964f790d6d

  • /data/data/com.numberfasf.StickerArtadxjl/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    7174079a09c614f5608ec5bf81478df5

    SHA1

    54e979b80708da95b67ef2bff9668ebc8973d72e

    SHA256

    9ec89b38c2087b6da39838da9b6f0319cdd81c7739bd692bdf638639479faee7

    SHA512

    c1f4e10c7c03fe107e5f8a916d0b70978370cb0b7462d68c4ac29817edeba583e454aa0a1def7f183a3f9c6adf3f48ab69241c0e5dd150949b913b5f8353963b

  • /data/data/com.numberfasf.StickerArtadxjl/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    a615442cf863778c371e94b5658277c8

    SHA1

    7f15e56415004649e8ba19a039a873c95042e6fb

    SHA256

    31258fe863c3644afd9211e200fd39a78ecf128a431371ea440a811c439bf998

    SHA512

    131638dec24f9c70d8499db8679e5bc41de0bd64e98be48c80013d3b8cc560e095817b87255863877617c51b2623da724a102acbbb80c2923ddb59cc61448be2

  • /data/user/0/com.numberfasf.StickerArtadxjl/app_merry/UtlQr.json

    Filesize

    1.7MB

    MD5

    b99c671f34e13773893a5ce44c7f43a7

    SHA1

    818419a336a3e0f17572cdd1f0d363eb005c8de6

    SHA256

    ae6b6c994ddb5b9ef0329de8aab60028743842de3b1717479b2d91835ec17a58

    SHA512

    ce80e7ffce3a1e2385f886d2b9fbfb7eec88b7e5f76e25abfaa6e6601ceeb1c3b01f8e91dda2b9d9d5de06b122a4523a867262a402461261d191df628074c667