Analysis
-
max time kernel
149s -
max time network
152s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
29-12-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
e998904d91f0bd3f2527270a734602a81ef08301bd5199a030fa230ede73888a.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
e998904d91f0bd3f2527270a734602a81ef08301bd5199a030fa230ede73888a.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
e998904d91f0bd3f2527270a734602a81ef08301bd5199a030fa230ede73888a.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
e998904d91f0bd3f2527270a734602a81ef08301bd5199a030fa230ede73888a.apk
-
Size
4.1MB
-
MD5
26cf8c3c90cec4ce06904240e65226c4
-
SHA1
433b70dddce7190a6c89a29a3932cbb4194686d9
-
SHA256
e998904d91f0bd3f2527270a734602a81ef08301bd5199a030fa230ede73888a
-
SHA512
a4510cf2e0142fb311c67f4c675fd2003fef9a17472d07c6656d3db8bd63d68d8646b902232c4776132f8558acf35053b43f154ab6431709779a5ce5444bbc9e
-
SSDEEP
98304:6xOxpM9fmwjt8KCSOTom+V8ljB/hzGU6YZIDq13ojwgT0fRq:Qvfmwjt8KCSOTV+KVq/JDq14Ec0M
Malware Config
Extracted
ermac
http://154.216.20.225:3434
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac family
-
Ermac2 payload 2 IoCs
resource yara_rule behavioral1/files/fstream-3.dat family_ermac2 behavioral1/memory/4317-1.dex family_ermac2 -
pid Process 4317 com.jwvihvzbn.pmppvqagi -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.jwvihvzbn.pmppvqagi/app_dex/classes.dex 4317 com.jwvihvzbn.pmppvqagi /data/user/0/com.jwvihvzbn.pmppvqagi/app_dex/classes.dex 4344 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.jwvihvzbn.pmppvqagi/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.jwvihvzbn.pmppvqagi/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.jwvihvzbn.pmppvqagi/app_dex/classes.dex 4317 com.jwvihvzbn.pmppvqagi -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.jwvihvzbn.pmppvqagi Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.jwvihvzbn.pmppvqagi Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.jwvihvzbn.pmppvqagi -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.jwvihvzbn.pmppvqagi -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.jwvihvzbn.pmppvqagi -
Performs UI accessibility actions on behalf of the user 1 TTPs 19 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.jwvihvzbn.pmppvqagi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.jwvihvzbn.pmppvqagi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.jwvihvzbn.pmppvqagi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.jwvihvzbn.pmppvqagi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.jwvihvzbn.pmppvqagi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.jwvihvzbn.pmppvqagi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.jwvihvzbn.pmppvqagi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.jwvihvzbn.pmppvqagi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.jwvihvzbn.pmppvqagi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.jwvihvzbn.pmppvqagi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.jwvihvzbn.pmppvqagi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.jwvihvzbn.pmppvqagi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.jwvihvzbn.pmppvqagi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.jwvihvzbn.pmppvqagi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.jwvihvzbn.pmppvqagi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.jwvihvzbn.pmppvqagi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.jwvihvzbn.pmppvqagi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.jwvihvzbn.pmppvqagi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.jwvihvzbn.pmppvqagi -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.jwvihvzbn.pmppvqagi -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.jwvihvzbn.pmppvqagi -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.jwvihvzbn.pmppvqagi -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.jwvihvzbn.pmppvqagi -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.jwvihvzbn.pmppvqagi -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.jwvihvzbn.pmppvqagi
Processes
-
com.jwvihvzbn.pmppvqagi1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4317 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.jwvihvzbn.pmppvqagi/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.jwvihvzbn.pmppvqagi/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4344
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
900KB
MD5d5b7b22b4cc41cc3a9047a3f43f6361d
SHA1ef278016ba2debb41a9220d633769b7feffef61e
SHA256f8c721b41a3b62a2d5622116b0ef7dc7956fa938871be78099c962ea336956cf
SHA5129e0849f3c2687a40f00cfd5f1826b0f0f522a35b5a2dfecc4c01b47e7e5658450dc1af066426a1816f7cb45ad1a704e083636f7ecb56268c5c73e9cab909149b
-
Filesize
443KB
MD521d0a94254eef95fcac42fa5057002b4
SHA1673ab396d262a1a95d23bd79ea2562349f7bd578
SHA256ae3d9430db81a0fd20205b6c3e25a3ffe3c2d41cbdd42198f3c2fd943a113694
SHA512f8e089e252c30d6a372a1f0f23e6ac9736ef029c52cfd34ff3d3f518be8157ce7290c90dbd6e37467c03f1a91637cee62a2599c5a2fc31413307b4648fc8925f
-
Filesize
444KB
MD5625b51be52ba12d841957c35999321c5
SHA12ac71439a3cd800744e864152dcbed233f5d6a38
SHA2560f0dd0f5e7d004b08bcdc006f24bd7cae5cbaedbe5492ffeaa195e7f0113992b
SHA512c1a5e88d55e4a7fa2d37208da9a9ea303fb2c32280bb82512fe04a75d227329f2bb2092f1b05b3a277f85100783a1cdf90613433f2ecbe69a58aea074fbdb05b
-
Filesize
900KB
MD5c47aa79c00a91fc24bc98bd6a3adbcfe
SHA1f0d7543c6a5a346f5eb65c0a9b46b9609ca8ea3a
SHA256b607130d3a0234b47a5a3620bb7ae7f6bf9470b255b7dc7005b794fe03f724f1
SHA5120ab5975b0636857f1c882fed89c85ea479c370b9a60de66593bf76c1371c07ca795ed524a34d2b40a179cc2f39f1b5114982ea3715b1dedc3f5e9cbfd9b7830b