Analysis

  • max time kernel
    149s
  • max time network
    162s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • submitted
    14/12/2024, 22:04

General

  • Target

    0374f6231210d9f796a43dbab1933d2afc5c4d4781eb53dde223364646365a61.apk

  • Size

    2.5MB

  • MD5

    fb93fa674322ad73c001429e34242807

  • SHA1

    c73055a5a32a00c1a460786fe526377971556caf

  • SHA256

    0374f6231210d9f796a43dbab1933d2afc5c4d4781eb53dde223364646365a61

  • SHA512

    359bef93a6082ad05efe593cd34e37c753e96935c4d5fb5ca42b569f8f540e8bac91f01b9eaee5619aeb3ea48214eed4a6c070624b0f4333e38b9d1a7343b814

  • SSDEEP

    49152:vHRoZ9gWJ4OrLrgv1seGEl3+0ujWHB9Z6s5m2AtSNkD5/vcrG8QN:poZ2yl61NG6ija9P5m5Kky7q

Malware Config

Extracted

Family

ermac

C2

http://adsfgbkapmgnsdvbr.pro

http://adsfgbkapmgbrsgsh.pro

http://adsfgbkapmgdbshb.pro

http://adsfgbkapmgsdfbbnn.pro

http://adsfgbkapmgdsagbbs.pro

AES_key

Extracted

Family

hook

C2

http://adsfgbkapmgnsdvbr.pro

http://adsfgbkapmgbrsgsh.pro

http://adsfgbkapmgdbshb.pro

http://adsfgbkapmgsdfbbnn.pro

http://adsfgbkapmgdsagbbs.pro

AES_key

Signatures

  • Ermac

    An Android banking trojan first seen in July 2021.

  • Ermac family
  • Ermac2 payload 2 IoCs
  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.feducepuvadura.ripe
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4402
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.feducepuvadura.ripe/app_cliff/cSoLjH.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.feducepuvadura.ripe/app_cliff/oat/x86/cSoLjH.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4429

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.feducepuvadura.ripe/app_cliff/cSoLjH.json

    Filesize

    691KB

    MD5

    45f752b79893f4f7297feb33ae0be922

    SHA1

    ce51b9850613fabfb57315493e7fe528223524a0

    SHA256

    d50d0610748623f354ac3128e304085c5f518a84d505277d7b60cbbca7a679b3

    SHA512

    19a1012f8513c9e486e008b253e8661c79aa91648128d3e6db8701ea558d1270c82df1376212ccd5847199100e377612a490879106c70cc099c7fea50c27e696

  • /data/data/com.feducepuvadura.ripe/app_cliff/cSoLjH.json

    Filesize

    691KB

    MD5

    f5514da623e4c8896875721c5833d1f9

    SHA1

    1f45f27c24f6274dad5e00e23356b3643941a899

    SHA256

    43955c158370620f312d71cd506f75b336d780a5a46cea605df3026ada946a9c

    SHA512

    79b1c63c890d87e278e0cae9005d0acfd4042f4e04d036e2a6e9173c5947d88cefd907a366066add28fad0e9490283daea8157e8f42176b1066f0b0e2e174486

  • /data/data/com.feducepuvadura.ripe/app_cliff/oat/cSoLjH.json.cur.prof

    Filesize

    3KB

    MD5

    95f79427fcd41a4ae03f1bc0872c63b2

    SHA1

    2357a1ba0b322861801528df227c323b0ee36483

    SHA256

    2706c5d69dc60580dbb4f97002da9f74117d3c07d413a167f09102c851dd232d

    SHA512

    f851d597e118073c90b8ce47ee97a6ad052db083449a055aeb3e29a158f8bb57adc0335f1d4fbbcba2becb51fbe03939c628e13e55bad7142ff75f2aab6b10bf

  • /data/data/com.feducepuvadura.ripe/app_cliff/oat/cSoLjH.json.cur.prof

    Filesize

    3KB

    MD5

    e8e1e8977f661df1611fe609d11d11c9

    SHA1

    ea558ac8356995693d9d3a0b8395112e84238295

    SHA256

    e3ba75c41c420090787801c1da2f47f2db2234dd653673e541dcca095d1296b3

    SHA512

    5052c6ee9d24715d1ecf53cfeb32612c6e0fbb9dcedfd35f03e7abaa33197d4cee1a814f23e49469b96d916daaa4c48ba8c475f56c63c2fee3198a404c1d10d4

  • /data/data/com.feducepuvadura.ripe/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.feducepuvadura.ripe/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    8b4d0b6c08da8d57460f7e8931c37716

    SHA1

    94af98af07fbc3af5c69f4fc7552767dcfb0b48c

    SHA256

    2b4cf2965f6852695673d456da0cd15b55f1ecc977efeb06fc472ef54e264668

    SHA512

    af513a5c478324120ae8892dae40b613a75112855893ca8e0c78fa97e09ea6adbfbb7486412774baee963fed74a364b1b5e4ed288d92dba6d932c67149778f32

  • /data/data/com.feducepuvadura.ripe/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.feducepuvadura.ripe/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    b2f1f79142013b477c4e58525f5b9896

    SHA1

    8677853ab7837656a5079f5b9763c1912abfbcb6

    SHA256

    724fd3f0fed6814680da443e7195fdfc5e6c1c7eed267a0d5cd7c4f75b8a9dd4

    SHA512

    d85e2204be90397743fe70496aeeb51c95851ed64ef8f3695552811d7a803b1def6f58ae9a37fab06a7507cadf276c247bc31007beaa5f1ac2969a72e3ca4439

  • /data/data/com.feducepuvadura.ripe/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    54011df3c40ece618b507dec1391c928

    SHA1

    e7e7b05ad36c4205790ea280c2c596c3b7e529a6

    SHA256

    b7ea863b4ff9738a2b01f4c68d53acc8399795aca7c669293c2d8b6e18c292d4

    SHA512

    73f6417f09e45741d2e4f86b00306791447d3f949bff3f4519a9538ec15f7b984d80d8337da11b3919c598d8d94ff118841aca0bb565b3d055c69f6bbc910507

  • /data/data/com.feducepuvadura.ripe/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    51a5063d1de8f5f65cacd45604ddd80c

    SHA1

    eccff8130e9b43e18330680afc1866c4d4d67202

    SHA256

    a45f7036df7e825fb19439f5dc774b9f7c7803a154b222bc9cdf2948ff8b92da

    SHA512

    e0d9742f730b2438130e49d8e28b6f95176643ffd974ea5a87c65d83fce2ddd39c4f05d8ab31a95323e10fff4a6ebefdd18830d6efd22596427e9e6116640d93

  • /data/user/0/com.feducepuvadura.ripe/app_cliff/cSoLjH.json

    Filesize

    1.5MB

    MD5

    cbba00a4d726520a2fd364fceea86aec

    SHA1

    bd8ea7c113e188a403cb9870c58d808e0f2f68be

    SHA256

    7655e64bb43dc98e13b998ca756dae89c9a395c9be5faa9443a744a2427c3294

    SHA512

    83240d2024db1f4446903b118c75b671b7a5196e235056e3850f626aa1abb4e95a68475180b98e72f613002c8918a224ad1e4afd4b88dc65f970f03a945f46d0

  • /data/user/0/com.feducepuvadura.ripe/app_cliff/cSoLjH.json

    Filesize

    1.5MB

    MD5

    8a145c4f07e391cdb24b4240c8a66a2e

    SHA1

    f6d78a112b62044ef2997610d663838940932ef9

    SHA256

    b863e6ddd45b84927a081cbdf48ebf27dd7fa7cb2b16731750ce3fa0b3172007

    SHA512

    5416019dafaece1a801b904482d0eb3772ad71db8101271db82b7b2f4d3a4bcec1a638066b6d6980af22d17bb5c77af7b5df9da17f63553199edc0fac6354611