Analysis
-
max time kernel
148s -
max time network
156s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
submitted
14-12-2024 22:04
Static task
static1
Behavioral task
behavioral1
Sample
59342af50e9edbafb4e90a1c7fc31bdb462fe2b4f0ad28d0c0753d82986c85b6.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
59342af50e9edbafb4e90a1c7fc31bdb462fe2b4f0ad28d0c0753d82986c85b6.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
59342af50e9edbafb4e90a1c7fc31bdb462fe2b4f0ad28d0c0753d82986c85b6.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
59342af50e9edbafb4e90a1c7fc31bdb462fe2b4f0ad28d0c0753d82986c85b6.apk
-
Size
3.1MB
-
MD5
13ce60bff72ecd99fcd437b0a0f415d8
-
SHA1
02cd6692e78276d92535bf74dc24d5c493cf2807
-
SHA256
59342af50e9edbafb4e90a1c7fc31bdb462fe2b4f0ad28d0c0753d82986c85b6
-
SHA512
dfab4fb23d9a27c41a00b998974c40815baf0900b54a0b6164664991cbd7fb11663a9dd01f1144e2ecc3b58d110bfac1a24f6f952191ddd3ae805c0164cded51
-
SSDEEP
49152:LPpWGyIKWYS58co0INuZwAA+Dz11lCHO8ifaj6sgrg67X/WNQQUHSiDF:L+IPYS58c8Gr5z17rv/PHFF
Malware Config
Extracted
ermac
http://adsfgbkapmgnsdvbr.pro
http://adsfgbkapmgbrsgsh.pro
http://adsfgbkapmgdbshb.pro
http://adsfgbkapmgsdfbbnn.pro
http://adsfgbkapmgdsagbbs.pro
Extracted
hook
http://adsfgbkapmgnsdvbr.pro
http://adsfgbkapmgbrsgsh.pro
http://adsfgbkapmgdbshb.pro
http://adsfgbkapmgsdfbbnn.pro
http://adsfgbkapmgdsagbbs.pro
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac family
-
Ermac2 payload 1 IoCs
resource yara_rule behavioral3/memory/4766-0.dex family_ermac2 -
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.kuhihasexaya.gixe/app_merit/ARcrM.json 4766 com.kuhihasexaya.gixe -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.kuhihasexaya.gixe Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.kuhihasexaya.gixe Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.kuhihasexaya.gixe -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.kuhihasexaya.gixe -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.kuhihasexaya.gixe -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.kuhihasexaya.gixe -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.kuhihasexaya.gixe -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.kuhihasexaya.gixe android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.kuhihasexaya.gixe android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.kuhihasexaya.gixe android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.kuhihasexaya.gixe android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.kuhihasexaya.gixe -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.kuhihasexaya.gixe -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.kuhihasexaya.gixe -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.kuhihasexaya.gixe -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.kuhihasexaya.gixe -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.kuhihasexaya.gixe -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.kuhihasexaya.gixe
Processes
-
com.kuhihasexaya.gixe1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4766
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
691KB
MD51fa160a28f736d984dabfcc2cd09ed77
SHA158bf098563d578072b9d5594e3456bfff461de3d
SHA256cb76ed898305a05558407559655a27601e63b6f1565df06cad7367932ea17682
SHA512ab8f3e9b101e7b362d99dbbbea0a4d615f2136ad7474502645054bc1cd754e69640d32043107f3cfd2af4dd4107b87c8971886e93e05628324ce867680805511
-
Filesize
691KB
MD56547a676fa8dbfb050716dc06f96fddb
SHA1b2b189921e46353fa24a06f8805cd056183deadf
SHA256d059b3e479f8f38ee5b7135e1eb156dbe1d0ee57de2b32fa9fc2490403ea964c
SHA51287ca58feda7c58983498fa5cb0766efb6668d190002d89f09e8d9dcd455da513a67533298763ca14fb223d22b4f1a0db69b48ef779a8a86519703a6653b26c89
-
Filesize
1.5MB
MD51274af3bac6bef94dfaa707bcea575fa
SHA199e5e67a2b200f07f38433148272a0f268a8fff4
SHA256a3e065a84d59fcf71ab6a41d71aeb5ce7c711ccf90631a907ba6f5d687cd3dbc
SHA512e2c09b21f47ae6ee3c3a8e2b494ecc7dade211082c7c1557e1fd75253702695e8c3b46a963016e2a576fc52d588e27f25a9376bbcdab497ca42a66c2c2bad4ac
-
Filesize
3KB
MD5f59bb77de5bc8ca032598b5ec9121a76
SHA13d47ca4b819a44c474abe29ed2a99f5231ceaa75
SHA256ffc23c6353d74ccc84a9dba1dc5892466c0c5f2b69f8ea1cdf10160c2f651cea
SHA51236f194839c5c3b31da8b818fe6530ecec3d72e1a694d53170fe42b0e1386b2f8ba11535ec43096c985c6bd640fae005ea42db01e8cdb832bfbc9366fa15a59ea
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD5dd4053e5dee44f7cbb39245a9a4232ef
SHA16dd39de031e2508f8f3d78b229d2ef0d188a5315
SHA25669b9a08f2163dcc1fe0b1770444318888acf130844246bade62e425e2478545b
SHA512239a234b0b1bbd863a99251c8ffe9dd4a7f247d12990cca0620c386353081f5a08b2e7b9e5a443c7195de8a8eb122649108db19724f291010ffcc5463382ff9a
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5fa5ccbb92399dd66bbc9af8cd11dc615
SHA10b5f4925b553be87ed79de1b69404c97fe358332
SHA256a049fab4b731450fa2880e293e89c89ab17d2d1cbca500a7a3bedd746661f859
SHA512cb22066f8bb93b0bd9372ef8826824fefdc895d187541259f8fd9f82288cd356de07509adeb9e09cc2f82710e6c32e7f08ac9a5b14593e282ce8bc8929f4bbe3
-
Filesize
108KB
MD57bcd52f7b554a244687c0f28c0486452
SHA128d15c47cc50b8be621a40f7a8324689b3f95158
SHA2568f3e246cc97d625d81a5f6b20645a645e8a1a570e99e863e9eceab5113065ad3
SHA5126b92805f418684f9f11d5d5498c4c7037ab434cbf44657dd881caada0597a0f4278003b0816996b9cb687cd522241673965e2836f19f0e163198ed812d213bd8
-
Filesize
173KB
MD5f8723a7b8dcd5e56bd6b0ff2097a9a63
SHA145acfb9c29c2c936e2a54ff7ee856db2c0263912
SHA2564c6acea844110601ba07683661c816cbc1535159554167e55c0cf7c10f229b37
SHA512418a49f1d69fc314dd1ae816c38f9fcccc8756d2124bbd14867481dc28d992c183960f0b8b960cb724fb72578782db1258ab1108196cc1ec41f9226873a4db6d