Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • submitted
    14/12/2024, 22:04

General

  • Target

    0374f6231210d9f796a43dbab1933d2afc5c4d4781eb53dde223364646365a61.apk

  • Size

    2.5MB

  • MD5

    fb93fa674322ad73c001429e34242807

  • SHA1

    c73055a5a32a00c1a460786fe526377971556caf

  • SHA256

    0374f6231210d9f796a43dbab1933d2afc5c4d4781eb53dde223364646365a61

  • SHA512

    359bef93a6082ad05efe593cd34e37c753e96935c4d5fb5ca42b569f8f540e8bac91f01b9eaee5619aeb3ea48214eed4a6c070624b0f4333e38b9d1a7343b814

  • SSDEEP

    49152:vHRoZ9gWJ4OrLrgv1seGEl3+0ujWHB9Z6s5m2AtSNkD5/vcrG8QN:poZ2yl61NG6ija9P5m5Kky7q

Malware Config

Extracted

Family

ermac

C2

http://adsfgbkapmgnsdvbr.pro

http://adsfgbkapmgbrsgsh.pro

http://adsfgbkapmgdbshb.pro

http://adsfgbkapmgsdfbbnn.pro

http://adsfgbkapmgdsagbbs.pro

AES_key

Extracted

Family

hook

C2

http://adsfgbkapmgnsdvbr.pro

http://adsfgbkapmgbrsgsh.pro

http://adsfgbkapmgdbshb.pro

http://adsfgbkapmgsdfbbnn.pro

http://adsfgbkapmgdsagbbs.pro

AES_key

Signatures

  • Ermac

    An Android banking trojan first seen in July 2021.

  • Ermac family
  • Ermac2 payload 1 IoCs
  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.feducepuvadura.ripe
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4738

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.feducepuvadura.ripe/app_cliff/cSoLjH.json

    Filesize

    691KB

    MD5

    45f752b79893f4f7297feb33ae0be922

    SHA1

    ce51b9850613fabfb57315493e7fe528223524a0

    SHA256

    d50d0610748623f354ac3128e304085c5f518a84d505277d7b60cbbca7a679b3

    SHA512

    19a1012f8513c9e486e008b253e8661c79aa91648128d3e6db8701ea558d1270c82df1376212ccd5847199100e377612a490879106c70cc099c7fea50c27e696

  • /data/user/0/com.feducepuvadura.ripe/app_cliff/cSoLjH.json

    Filesize

    691KB

    MD5

    f5514da623e4c8896875721c5833d1f9

    SHA1

    1f45f27c24f6274dad5e00e23356b3643941a899

    SHA256

    43955c158370620f312d71cd506f75b336d780a5a46cea605df3026ada946a9c

    SHA512

    79b1c63c890d87e278e0cae9005d0acfd4042f4e04d036e2a6e9173c5947d88cefd907a366066add28fad0e9490283daea8157e8f42176b1066f0b0e2e174486

  • /data/user/0/com.feducepuvadura.ripe/app_cliff/cSoLjH.json

    Filesize

    1.5MB

    MD5

    8a145c4f07e391cdb24b4240c8a66a2e

    SHA1

    f6d78a112b62044ef2997610d663838940932ef9

    SHA256

    b863e6ddd45b84927a081cbdf48ebf27dd7fa7cb2b16731750ce3fa0b3172007

    SHA512

    5416019dafaece1a801b904482d0eb3772ad71db8101271db82b7b2f4d3a4bcec1a638066b6d6980af22d17bb5c77af7b5df9da17f63553199edc0fac6354611

  • /data/user/0/com.feducepuvadura.ripe/app_cliff/oat/cSoLjH.json.cur.prof

    Filesize

    2KB

    MD5

    d613114b0dcc839a879a9181404c4c5b

    SHA1

    34ec83b3466997204486551739c6df66014768ba

    SHA256

    89da17cd8da6c1c5a14e4d8778b06304d0c790897c01805968f0ba4625dfcb0e

    SHA512

    f2fd91005dc95aa78a2aed6bc8e006a1173e7b6681b4d261bfa76351686311961c85de5f95046eaf3b978e4112bb8218db804f5a1c70ded006cc29146dcb9a08

  • /data/user/0/com.feducepuvadura.ripe/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/user/0/com.feducepuvadura.ripe/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    4c481c95d5484c434f2f34f122d22847

    SHA1

    7360058c2c9837da0b03487f4c6e9e3c44410b6c

    SHA256

    6954d574026c01442443bc1b46390456d035b3d1d306c1c9a84ab42fec0929c8

    SHA512

    f7d39bf8b6e79e6db8ecab0fa907422985f6c2977371991ed77178c87d83079caf12d95c3e62aa3a602600f209e99d25c773d0ee91beaaa3a8c144c49efc3485

  • /data/user/0/com.feducepuvadura.ripe/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/user/0/com.feducepuvadura.ripe/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    32865b6cb3a9bb93cf7dfbf417747dfe

    SHA1

    5ae4cddf2f841beba5c6268aec95846124c83deb

    SHA256

    596c1e1326aa4e067da70faf6514e2d57916dec62d5345e787afc24dfb6d5026

    SHA512

    e216e328f4c8b122fa80f82a736fa34ee4c241504e07b940b5012ebf84ef9c4886e22e0093fd169aa40a3ba83b3f2aad0a14eba818aa26a925462a4eeb07458a

  • /data/user/0/com.feducepuvadura.ripe/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    b7cff82fa9f0d39a4f3952e4ddccc79a

    SHA1

    313fdbbfa843fb14d2e5aa214925058c9dac599b

    SHA256

    307fd4d83806ce62dbe400eded54d0510ff5a084ac248a070d10cd606a4d3fae

    SHA512

    51220618e37fa66f177fec7a27662fb729ca0c092076cd12ca4ee7ed879f2d16f07d79d224af16146b41b0a2264f8659b83ae69d0eda50f6b6ee632153b70107

  • /data/user/0/com.feducepuvadura.ripe/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    5a07f2a8b6c4825d3ac82f689694f688

    SHA1

    9f8124006952f8e5649095f6215c81059fc58b13

    SHA256

    621c014608e58f0a1a52df4c25e582d2786755163bc15330196445ada108f844

    SHA512

    a65d4e87b11b11124d76fb4a3524d5ebcd73daf51d523f866eb014ad3dc35ddcdede661bbbe5a7127681dd1165a023a5801032dac1a19a5ccd2e3cda3707bb0a