Analysis
-
max time kernel
149s -
max time network
162s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
submitted
14/12/2024, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
0374f6231210d9f796a43dbab1933d2afc5c4d4781eb53dde223364646365a61.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
0374f6231210d9f796a43dbab1933d2afc5c4d4781eb53dde223364646365a61.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
0374f6231210d9f796a43dbab1933d2afc5c4d4781eb53dde223364646365a61.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
0374f6231210d9f796a43dbab1933d2afc5c4d4781eb53dde223364646365a61.apk
-
Size
2.5MB
-
MD5
fb93fa674322ad73c001429e34242807
-
SHA1
c73055a5a32a00c1a460786fe526377971556caf
-
SHA256
0374f6231210d9f796a43dbab1933d2afc5c4d4781eb53dde223364646365a61
-
SHA512
359bef93a6082ad05efe593cd34e37c753e96935c4d5fb5ca42b569f8f540e8bac91f01b9eaee5619aeb3ea48214eed4a6c070624b0f4333e38b9d1a7343b814
-
SSDEEP
49152:vHRoZ9gWJ4OrLrgv1seGEl3+0ujWHB9Z6s5m2AtSNkD5/vcrG8QN:poZ2yl61NG6ija9P5m5Kky7q
Malware Config
Extracted
ermac
http://adsfgbkapmgnsdvbr.pro
http://adsfgbkapmgbrsgsh.pro
http://adsfgbkapmgdbshb.pro
http://adsfgbkapmgsdfbbnn.pro
http://adsfgbkapmgdsagbbs.pro
Extracted
hook
http://adsfgbkapmgnsdvbr.pro
http://adsfgbkapmgbrsgsh.pro
http://adsfgbkapmgdbshb.pro
http://adsfgbkapmgsdfbbnn.pro
http://adsfgbkapmgdsagbbs.pro
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac family
-
Ermac2 payload 2 IoCs
resource yara_rule behavioral1/memory/4429-0.dex family_ermac2 behavioral1/memory/4402-0.dex family_ermac2 -
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.feducepuvadura.ripe/app_cliff/cSoLjH.json 4429 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.feducepuvadura.ripe/app_cliff/cSoLjH.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.feducepuvadura.ripe/app_cliff/oat/x86/cSoLjH.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.feducepuvadura.ripe/app_cliff/cSoLjH.json 4402 com.feducepuvadura.ripe -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.feducepuvadura.ripe Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.feducepuvadura.ripe Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.feducepuvadura.ripe -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.feducepuvadura.ripe -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.feducepuvadura.ripe -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.feducepuvadura.ripe -
Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.feducepuvadura.ripe android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.feducepuvadura.ripe android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.feducepuvadura.ripe android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.feducepuvadura.ripe android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.feducepuvadura.ripe android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.feducepuvadura.ripe android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.feducepuvadura.ripe android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.feducepuvadura.ripe -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.feducepuvadura.ripe -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.feducepuvadura.ripe -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.feducepuvadura.ripe -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.feducepuvadura.ripe -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.feducepuvadura.ripe -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.feducepuvadura.ripe -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.feducepuvadura.ripe -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.feducepuvadura.ripe
Processes
-
com.feducepuvadura.ripe1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4402 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.feducepuvadura.ripe/app_cliff/cSoLjH.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.feducepuvadura.ripe/app_cliff/oat/x86/cSoLjH.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4429
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
691KB
MD545f752b79893f4f7297feb33ae0be922
SHA1ce51b9850613fabfb57315493e7fe528223524a0
SHA256d50d0610748623f354ac3128e304085c5f518a84d505277d7b60cbbca7a679b3
SHA51219a1012f8513c9e486e008b253e8661c79aa91648128d3e6db8701ea558d1270c82df1376212ccd5847199100e377612a490879106c70cc099c7fea50c27e696
-
Filesize
691KB
MD5f5514da623e4c8896875721c5833d1f9
SHA11f45f27c24f6274dad5e00e23356b3643941a899
SHA25643955c158370620f312d71cd506f75b336d780a5a46cea605df3026ada946a9c
SHA51279b1c63c890d87e278e0cae9005d0acfd4042f4e04d036e2a6e9173c5947d88cefd907a366066add28fad0e9490283daea8157e8f42176b1066f0b0e2e174486
-
Filesize
3KB
MD595f79427fcd41a4ae03f1bc0872c63b2
SHA12357a1ba0b322861801528df227c323b0ee36483
SHA2562706c5d69dc60580dbb4f97002da9f74117d3c07d413a167f09102c851dd232d
SHA512f851d597e118073c90b8ce47ee97a6ad052db083449a055aeb3e29a158f8bb57adc0335f1d4fbbcba2becb51fbe03939c628e13e55bad7142ff75f2aab6b10bf
-
Filesize
3KB
MD5e8e1e8977f661df1611fe609d11d11c9
SHA1ea558ac8356995693d9d3a0b8395112e84238295
SHA256e3ba75c41c420090787801c1da2f47f2db2234dd653673e541dcca095d1296b3
SHA5125052c6ee9d24715d1ecf53cfeb32612c6e0fbb9dcedfd35f03e7abaa33197d4cee1a814f23e49469b96d916daaa4c48ba8c475f56c63c2fee3198a404c1d10d4
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD58b4d0b6c08da8d57460f7e8931c37716
SHA194af98af07fbc3af5c69f4fc7552767dcfb0b48c
SHA2562b4cf2965f6852695673d456da0cd15b55f1ecc977efeb06fc472ef54e264668
SHA512af513a5c478324120ae8892dae40b613a75112855893ca8e0c78fa97e09ea6adbfbb7486412774baee963fed74a364b1b5e4ed288d92dba6d932c67149778f32
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
108KB
MD5b2f1f79142013b477c4e58525f5b9896
SHA18677853ab7837656a5079f5b9763c1912abfbcb6
SHA256724fd3f0fed6814680da443e7195fdfc5e6c1c7eed267a0d5cd7c4f75b8a9dd4
SHA512d85e2204be90397743fe70496aeeb51c95851ed64ef8f3695552811d7a803b1def6f58ae9a37fab06a7507cadf276c247bc31007beaa5f1ac2969a72e3ca4439
-
Filesize
173KB
MD554011df3c40ece618b507dec1391c928
SHA1e7e7b05ad36c4205790ea280c2c596c3b7e529a6
SHA256b7ea863b4ff9738a2b01f4c68d53acc8399795aca7c669293c2d8b6e18c292d4
SHA51273f6417f09e45741d2e4f86b00306791447d3f949bff3f4519a9538ec15f7b984d80d8337da11b3919c598d8d94ff118841aca0bb565b3d055c69f6bbc910507
-
Filesize
16KB
MD551a5063d1de8f5f65cacd45604ddd80c
SHA1eccff8130e9b43e18330680afc1866c4d4d67202
SHA256a45f7036df7e825fb19439f5dc774b9f7c7803a154b222bc9cdf2948ff8b92da
SHA512e0d9742f730b2438130e49d8e28b6f95176643ffd974ea5a87c65d83fce2ddd39c4f05d8ab31a95323e10fff4a6ebefdd18830d6efd22596427e9e6116640d93
-
Filesize
1.5MB
MD5cbba00a4d726520a2fd364fceea86aec
SHA1bd8ea7c113e188a403cb9870c58d808e0f2f68be
SHA2567655e64bb43dc98e13b998ca756dae89c9a395c9be5faa9443a744a2427c3294
SHA51283240d2024db1f4446903b118c75b671b7a5196e235056e3850f626aa1abb4e95a68475180b98e72f613002c8918a224ad1e4afd4b88dc65f970f03a945f46d0
-
Filesize
1.5MB
MD58a145c4f07e391cdb24b4240c8a66a2e
SHA1f6d78a112b62044ef2997610d663838940932ef9
SHA256b863e6ddd45b84927a081cbdf48ebf27dd7fa7cb2b16731750ce3fa0b3172007
SHA5125416019dafaece1a801b904482d0eb3772ad71db8101271db82b7b2f4d3a4bcec1a638066b6d6980af22d17bb5c77af7b5df9da17f63553199edc0fac6354611