Analysis
-
max time kernel
147s -
max time network
157s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
submitted
14/12/2024, 22:05
Static task
static1
Behavioral task
behavioral1
Sample
aacff9d32b16471cd14ed2cf27430d9b1e5649d194bb8d8372376322d7fc337f.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
aacff9d32b16471cd14ed2cf27430d9b1e5649d194bb8d8372376322d7fc337f.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
aacff9d32b16471cd14ed2cf27430d9b1e5649d194bb8d8372376322d7fc337f.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
aacff9d32b16471cd14ed2cf27430d9b1e5649d194bb8d8372376322d7fc337f.apk
-
Size
2.8MB
-
MD5
c7c51f91437f54b68b54da95f6d2fec4
-
SHA1
cae0d1caee8f7e1c2b30263c835f13ee7cc72395
-
SHA256
aacff9d32b16471cd14ed2cf27430d9b1e5649d194bb8d8372376322d7fc337f
-
SHA512
a613f6206a974835c60d131bc9bb9042a5ff55c7934240e078ea219e66ef2ee03176b867c48909e78504618b1fcfbb0b8a9743d0ecc979fc10ebb60644caf2eb
-
SSDEEP
49152:bnJrgeSxCCALNz+MzmMbNRHDFQxA94Ou3ZiwuNlYGZudEilH8NGDpq5A7KObyBzL:bnzfCMzTbN/QxK4Ou3ZiwuG3csFq50b2
Malware Config
Extracted
ermac
http://adsfgbkapmgnsdvbr.pro
http://adsfgbkapmgbrsgsh.pro
http://adsfgbkapmgdbshb.pro
http://adsfgbkapmgsdfbbnn.pro
http://adsfgbkapmgdsagbbs.pro
Extracted
hook
http://adsfgbkapmgnsdvbr.pro
http://adsfgbkapmgbrsgsh.pro
http://adsfgbkapmgdbshb.pro
http://adsfgbkapmgsdfbbnn.pro
http://adsfgbkapmgdsagbbs.pro
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac family
-
Ermac2 payload 1 IoCs
resource yara_rule behavioral1/memory/4316-0.dex family_ermac2 -
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.tocagesucivoya.majo/app_rotate/wWqUWlJ.json 4316 com.tocagesucivoya.majo -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tocagesucivoya.majo Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.tocagesucivoya.majo Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.tocagesucivoya.majo -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.tocagesucivoya.majo -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.tocagesucivoya.majo -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.tocagesucivoya.majo -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tocagesucivoya.majo android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tocagesucivoya.majo android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tocagesucivoya.majo android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tocagesucivoya.majo android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tocagesucivoya.majo -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.tocagesucivoya.majo -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.tocagesucivoya.majo -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.tocagesucivoya.majo -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.tocagesucivoya.majo -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.tocagesucivoya.majo -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.tocagesucivoya.majo -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.tocagesucivoya.majo
Processes
-
com.tocagesucivoya.majo1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4316
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e1c959b6ea5490996b015d50cb9758b6
SHA1daa20c3315436c487d33844b31eae0503ee0807c
SHA2562bd3ccda8a8164fd3614587f6e56f563f4827752b14ae42dd531883d4b965bcd
SHA512f69cf732ac8ba2a51402d8391322f14bd230b90df3f41980eb1777332619d814cb84b5f0d857fed19ca6b97952e70f06f2760e6714dc85b2758fd957681eeec8
-
Filesize
691KB
MD5af16d4c3922521886b2955d6b800e291
SHA1e576e82f7323e7b0d5330fed95f0fb28d0ef3069
SHA256ae7478e56436ae61d114646df78105c6da7ed8ae4c53e5dbc71575820c32b2d4
SHA512e4e853de6d9368e63bb85e484aaabb0c55e981a98ba2b4ddec2a9d0b7a430806d959f7e2e90e94b486c0e396af827b403ee713567c75528f59acc350b5458d37
-
Filesize
691KB
MD5417e8c6eadbd84bc5a150a13e9fb1dae
SHA15f367676dd413ae3c554816054241c0e51de53d4
SHA2564b77eefd513318eb812d8b45bb0de0850a303de2705d59c470b68e083497bd8e
SHA5123ff5c9aaf5132186244381cfcdd968b63d4877161425d922ef8978a5e8d1aa51b044bba4cbd6e05571f6a59ec34e676bf487132f45dd9f4d1315c8f6046ea69c
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5a3770d87698f6b928491c7147a76113b
SHA185d732dad5d68624db686dddb954317e3e8c66de
SHA256f6412dcf2af2f69fdafe658b7a027d9121d26310d1aceeb0567e83db9c11c727
SHA5127dfb9177d282e29dffe2b31bdb2bd3bd6d86a8dab9811c0f81446a6e37653b469ceb9c8438b674b808ea901405d3afce843e4f1d71cc83e7f1e6c9a981332060
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
108KB
MD511cda4e828176f872be95612b0a2cdec
SHA1ffe2acfc6da9faffb26e9d39dcfab9e288f35788
SHA256523094cf6d9218c2a414c19d62ecbce8ac09cfe76782d1d7af2b20e8ca249094
SHA512f37ef38bdf405cf1739f11a4550eea67f39a44d11348db0e1e1deb44f34d5ac28f2a23c12370cbb3731ddeebb613bebabd0c346fc1d60437ac3a543df88a3061
-
Filesize
173KB
MD5dec29036ceba24a7265a6824176ae1bf
SHA13b9872258a5bfa993e92375e2eb4b898d7bbbddf
SHA256c46981442083bce3d3ae4e03697e7f25003f91d14805b527e50c5e79ac0c481b
SHA512e203145178102daf76259d494d8bd8405e96c114a1d97fa61462bde15bf0595375fe2557ff4f6fa1e77e24b70380df1bcc3a97cde554e8747bca3758e24600e8
-
Filesize
16KB
MD5e3766c74186a9d40653ae3d4102f645a
SHA1491d584be81557839b5f3b89557615606cd435fc
SHA256079e05f78891940c13b936d99c025a9bed80dbe3dacd1526eda917ca4e04e5d1
SHA5120883cd5069e810c663a3bd068a0aa766c304ee22cc8f3c34d7b6e2a288355a9f52a7e386495208c9d40b5c25e65c4003cf0a019f7345c6b3f239806c21d41547
-
Filesize
1.5MB
MD5cc3f7e15e6ecf198c853329e3de827af
SHA1bd019e147a78453338cd55cafb54ede8af9d054a
SHA2565df7d54bac53e838adaa098a5572e08d97d2af20832ca5a06bceb3bd1f7de306
SHA512f75f96e217fced75326a740d39b97e24d1c30ac6b33edad39d77e34aba6a7b742d1c07d73b90e528b74e310f5893598093fb8140ce8f438daec897e2099d258f