Analysis

  • max time kernel
    68s
  • max time network
    162s
  • platform
    android-10_x64
  • resource
    android-x64-20240910-en
  • submitted
    14/12/2024, 22:04

General

  • Target

    0374f6231210d9f796a43dbab1933d2afc5c4d4781eb53dde223364646365a61.apk

  • Size

    2.5MB

  • MD5

    fb93fa674322ad73c001429e34242807

  • SHA1

    c73055a5a32a00c1a460786fe526377971556caf

  • SHA256

    0374f6231210d9f796a43dbab1933d2afc5c4d4781eb53dde223364646365a61

  • SHA512

    359bef93a6082ad05efe593cd34e37c753e96935c4d5fb5ca42b569f8f540e8bac91f01b9eaee5619aeb3ea48214eed4a6c070624b0f4333e38b9d1a7343b814

  • SSDEEP

    49152:vHRoZ9gWJ4OrLrgv1seGEl3+0ujWHB9Z6s5m2AtSNkD5/vcrG8QN:poZ2yl61NG6ija9P5m5Kky7q

Malware Config

Extracted

Family

ermac

C2

http://adsfgbkapmgnsdvbr.pro

http://adsfgbkapmgbrsgsh.pro

http://adsfgbkapmgdbshb.pro

http://adsfgbkapmgsdfbbnn.pro

http://adsfgbkapmgdsagbbs.pro

AES_key

Extracted

Family

hook

C2

http://adsfgbkapmgnsdvbr.pro

http://adsfgbkapmgbrsgsh.pro

http://adsfgbkapmgdbshb.pro

http://adsfgbkapmgsdfbbnn.pro

http://adsfgbkapmgdsagbbs.pro

AES_key

Signatures

  • Ermac

    An Android banking trojan first seen in July 2021.

  • Ermac family
  • Ermac2 payload 1 IoCs
  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.feducepuvadura.ripe
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:5057

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.feducepuvadura.ripe/app_cliff/cSoLjH.json

    Filesize

    691KB

    MD5

    45f752b79893f4f7297feb33ae0be922

    SHA1

    ce51b9850613fabfb57315493e7fe528223524a0

    SHA256

    d50d0610748623f354ac3128e304085c5f518a84d505277d7b60cbbca7a679b3

    SHA512

    19a1012f8513c9e486e008b253e8661c79aa91648128d3e6db8701ea558d1270c82df1376212ccd5847199100e377612a490879106c70cc099c7fea50c27e696

  • /data/data/com.feducepuvadura.ripe/app_cliff/cSoLjH.json

    Filesize

    691KB

    MD5

    f5514da623e4c8896875721c5833d1f9

    SHA1

    1f45f27c24f6274dad5e00e23356b3643941a899

    SHA256

    43955c158370620f312d71cd506f75b336d780a5a46cea605df3026ada946a9c

    SHA512

    79b1c63c890d87e278e0cae9005d0acfd4042f4e04d036e2a6e9173c5947d88cefd907a366066add28fad0e9490283daea8157e8f42176b1066f0b0e2e174486

  • /data/data/com.feducepuvadura.ripe/app_cliff/oat/cSoLjH.json.cur.prof

    Filesize

    3KB

    MD5

    cf5bb6db69ddb14e2cf511614a122613

    SHA1

    325aa200c0f91e105e6d192cf114e5dc7992b401

    SHA256

    a4e0630de25b0e11841028c6138c4493849f9a93083c7c9edf54feb849ca0f83

    SHA512

    2be00f3a798a35a443758decd9d04c164f4399ca069eebdcedcb9be571057b98c98b48382a397192a549cdc5f254edffc8c22db4c16fc8814e8f176a528396d5

  • /data/data/com.feducepuvadura.ripe/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.feducepuvadura.ripe/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    e706f32bc42b612921d799d38b0c2d08

    SHA1

    6b6a1e12539fa38a830a61f691e41a0e2fbf71a3

    SHA256

    96feecfe96ece420ccf4ba7f131c644ac05ca8c5733eb9c5049b47d133b79feb

    SHA512

    e0b5973ceade95d1d0ffc1d54e9f5b197a8113b544d94177033cfc5e484a47c80f0b95b44c96c105f84f880b3a7832d0e5da993a981a02168d6b4bf7fc53cea8

  • /data/data/com.feducepuvadura.ripe/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.feducepuvadura.ripe/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    e0b8aa00cddc68fb45da0e7a564b58cc

    SHA1

    12ef307cda27a62442fcf35a3619387b9c42e4dc

    SHA256

    b6b06e7860fba390de6e3342470c7c86ec368563b5e0cd9591f553dd50ab4e4d

    SHA512

    038dd8c4826060237ad9b95eb275e3abb836fd1f14419028359074bb48c85464a378b825caaf13b9e5da9d917e2ba58deac75b607d9fb2f042372ee42123c1bb

  • /data/data/com.feducepuvadura.ripe/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    b2a3960e754891f4d1ef4b82f5a3a48d

    SHA1

    6add33b11ab7732d87c0bad02a63d7374cb1e217

    SHA256

    da1d946bb5078b8deaae8faf464d637f5f35b4dd279959186ab7a2f25a99b191

    SHA512

    ba580100c09e1080c5bb96099bfbf69a7e63fc6320189a1b50a32b0ce0851a0a1729ddd1df5822ed45c873c4fea1c63686a8aaf0754d08e4456d96c3ab5f60e4

  • /data/data/com.feducepuvadura.ripe/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    5190697ffa7ce145d279d025e361db0e

    SHA1

    ba22fd2a9b1dfca59a7a766bbff14dbfd1c6780c

    SHA256

    b3da8af3c366cd90541ecdb08e1257d2843fb596f6f0a434c7a1a121a418db02

    SHA512

    d10c303a9627f0db146d6ea5a8480f69fba6c509d49c8727170e13568f85627f3d585beb452d8a496dbe366436f5ca24af194cfd01511233a8f635a680e82060

  • /data/user/0/com.feducepuvadura.ripe/app_cliff/cSoLjH.json

    Filesize

    1.5MB

    MD5

    8a145c4f07e391cdb24b4240c8a66a2e

    SHA1

    f6d78a112b62044ef2997610d663838940932ef9

    SHA256

    b863e6ddd45b84927a081cbdf48ebf27dd7fa7cb2b16731750ce3fa0b3172007

    SHA512

    5416019dafaece1a801b904482d0eb3772ad71db8101271db82b7b2f4d3a4bcec1a638066b6d6980af22d17bb5c77af7b5df9da17f63553199edc0fac6354611