Analysis

  • max time kernel
    39s
  • max time network
    156s
  • platform
    android_x64
  • resource
    android-x64-20240624-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system
  • submitted
    12-12-2024 22:01

General

  • Target

    b7672ab21441af12cd18cb07017ec204772639abcd190b6c0db129cdde6869a2.apk

  • Size

    3.4MB

  • MD5

    8597c427916067bd8c9e51b21d2358fb

  • SHA1

    03e624759d2d7ee202a57f05b3a416adaad3af5d

  • SHA256

    b7672ab21441af12cd18cb07017ec204772639abcd190b6c0db129cdde6869a2

  • SHA512

    0fe969d4877f836cd7ba295635fac881dabca516b02fa3e2fed5d739076a5f4461a1242d16991b3b840f0dfe13ce18131730739fb40fb1a08accade66d74c946

  • SSDEEP

    98304:C5Vv/hgeIs9LD9qy3T3Bv20YVqAlh8LgRvRhlCDQ:Es8n0eT3ozVqi4qvDlCDQ

Malware Config

Extracted

Family

ermac

C2

http://154.216.19.93

AES_key

Extracted

Family

hook

C2

http://154.216.19.93

AES_key

Signatures

  • Ermac

    An Android banking trojan first seen in July 2021.

  • Ermac family
  • Ermac2 payload 1 IoCs
  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.kamatkap.mafuko
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4983

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.kamatkap.mafuko/app_team/TwdabuH.json

    Filesize

    736KB

    MD5

    3eecc2e4a241bed02d54df56ac9e7c2b

    SHA1

    11ca54c267ebf6a8e1a07b70bb3d0aba60728062

    SHA256

    5c96e2a6bd086692459ac7427a2990d4bff6b4ceb576f2a1e99f9452d4089c35

    SHA512

    07bf838883df4c0c167736af481d1811d113b211e55d9c6bcd2e5e5cb169be9ee03b179ab59153fa905317d2db26ba2de65d5464b8393045a4a15e31c0e45534

  • /data/data/com.kamatkap.mafuko/app_team/TwdabuH.json

    Filesize

    736KB

    MD5

    17a9b0eaa067c313b23188d78efdd3e5

    SHA1

    b220cf0f634bf76378369ee0dbc09a536d0e18d8

    SHA256

    ee72805e8047d1d22cce1818dbb216139c2f2e623ec2994e0a60309fcbeb630e

    SHA512

    330d5d37ab6f6e68bd2284a790f063769d097bcb2d3f0b261fcc31a4de0b5b41eca577e0c63c79d517e2227024d673fb94e7a453f2597255de25f836e6bb9530

  • /data/data/com.kamatkap.mafuko/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.kamatkap.mafuko/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    72d618e76af715489de2d0a84fc11ab2

    SHA1

    47494e8b29ec0cdb3c04a15ab08476b16679b6c9

    SHA256

    8ba0131efe58cde53afb32fa2ef75833fe39b349a02cb883d6f3a8bbdfd43d14

    SHA512

    f46dffb2f0fee12a74511ba38f97a20f557c67dbbd061d78ca1d3c9c01289e2ad629eb6f10bdb15707cd5fc83edc3af82e39a2a3248b0c5b61a8bbb7e308e994

  • /data/data/com.kamatkap.mafuko/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.kamatkap.mafuko/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    67ac68dc31f973f3c2ed44cccc28af1a

    SHA1

    e48314e4c165acc5aaf95e4c1ac51f2fcfdf38dd

    SHA256

    4d038fd22008f2c9845ba11ca3eeed73838bea56a8e00f52ee4df71cd9170df8

    SHA512

    633e0e9bbf867e36718dc8ed4a6124ae7cde0f9859a40a2b8b8739e2b664d1011974750be89067ec1dc283f08950165974ab9347cf2b0100e8a229057abe77f3

  • /data/data/com.kamatkap.mafuko/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    408cbea979d19155e43252c4c3784c69

    SHA1

    15f6cba98820d7f8871674909d8f7b58101311ff

    SHA256

    8b325c2c2b4b818cc23914dfec523b44ded1ad2c8c7e9c4f74ad3c15bd4dc303

    SHA512

    763b9654a5a98efe6b424f565bf1c48b956de43f268567b813660e0b15e8806266b3f3146fd94284819c3919486ae5adda8ea3ade20fdc0185bde626a933667c

  • /data/data/com.kamatkap.mafuko/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    3eced6a63e60ace465e372d24a0f5b98

    SHA1

    4892ee943aa1c7aa52c49c195d3fdabebf0b54ab

    SHA256

    92ec702d4fc00bbe6baddde020ee43f2afe0b0b972a160455fa197a6b45ded3a

    SHA512

    07620aaf80e1e5bb6559dc609ea5148b5cd8122574c2aa49c2671a91466dedde5183630b2348793c80b444db13120e2a08fd971f33c8814ad4fa10a2f32353a1

  • /data/user/0/com.kamatkap.mafuko/app_team/TwdabuH.json

    Filesize

    1.7MB

    MD5

    332e75f1e51240a01d136055c2a31788

    SHA1

    6d577e35bb5162bd93c3280827915a81da441838

    SHA256

    8429ac18967aa2f7aac10d6d3ee6354203b7d5104acc5ca7f62f33e5a81df17b

    SHA512

    9f1037a551228f382aa5545f80a8c34e99f6b3c5b434a39474eff301c675885b1be9698a6b740ed9664b65ffe45b34d7d32a7ad06c39537fa2cdf292195d8d30