General

  • Target

    a0263a4c9fa4cab6b8170327897d1de7bb2acf99fa7c9aa31d7376134dbd8526.bin

  • Size

    1018KB

  • Sample

    241231-1wx7catpej

  • MD5

    975c9fd366b201a8a6542e2ab116244f

  • SHA1

    3c36c41d01b781ee83af4d3a87875ae52d99b7db

  • SHA256

    a0263a4c9fa4cab6b8170327897d1de7bb2acf99fa7c9aa31d7376134dbd8526

  • SHA512

    571788cfa1ffd7c198d7c3a74a10a96b645fc25bb5f899334f6dbdd744e0bd42833f9558e863c2ac625140784e6cfed562a7e8e1d7f69f9d050e19b4ad003a22

  • SSDEEP

    24576:ptgRsqeoSbbNJz3gSDU+rUACACYnkUfq+I/tR:psZSbhJbgSTrhCYnkUfq+I/T

Malware Config

Extracted

Family

ermac

C2

http://45.158.14.11:3434

AES_key
AES_key

Targets

    • Target

      a0263a4c9fa4cab6b8170327897d1de7bb2acf99fa7c9aa31d7376134dbd8526.bin

    • Size

      1018KB

    • MD5

      975c9fd366b201a8a6542e2ab116244f

    • SHA1

      3c36c41d01b781ee83af4d3a87875ae52d99b7db

    • SHA256

      a0263a4c9fa4cab6b8170327897d1de7bb2acf99fa7c9aa31d7376134dbd8526

    • SHA512

      571788cfa1ffd7c198d7c3a74a10a96b645fc25bb5f899334f6dbdd744e0bd42833f9558e863c2ac625140784e6cfed562a7e8e1d7f69f9d050e19b4ad003a22

    • SSDEEP

      24576:ptgRsqeoSbbNJz3gSDU+rUACACYnkUfq+I/tR:psZSbhJbgSTrhCYnkUfq+I/T

    • Ermac

      An Android banking trojan first seen in July 2021.

    • Ermac family

    • Removes its main activity from the application launcher

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks