Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    25s
  • max time network
    158s
  • platform
    android_x64
  • resource
    android-x64-20240624-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system
  • submitted
    04/01/2025, 22:00

General

  • Target

    edb8acd104ad2427a79922d07f9419580fd9aeb746f940422851b431ff61b48d.apk

  • Size

    3.3MB

  • MD5

    2a884cd0c07e28a58aef5abe799f34d9

  • SHA1

    966488faebce0d98b9be6d8705577a894fdcacc8

  • SHA256

    edb8acd104ad2427a79922d07f9419580fd9aeb746f940422851b431ff61b48d

  • SHA512

    f0ad86beb094c1ad938efeba180cc145bc8f30d82169579850fa461985d9e49606d6dc4148600224796f63eecc9dc4bca1084168fd73dd9776ee490538e23df4

  • SSDEEP

    98304:H2UARrIK9eUk8spO1w93yRunnkC9tyzgZLaQYEy:ARrzdrspO1cMukCeUxfYEy

Malware Config

Extracted

Family

ermac

AES_key

Extracted

Family

hook

AES_key

Signatures

  • Ermac

    An Android banking trojan first seen in July 2021.

  • Ermac family
  • Ermac2 payload 1 IoCs
  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.jekefanesuli.vako
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4930

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.jekefanesuli.vako/app_engine/DDF.json

    Filesize

    665KB

    MD5

    22e240b36c2b8848165d8caf97262510

    SHA1

    daaed9d2f94539cc5e9770484b95df68fdd6195e

    SHA256

    ef216fd44a958ee9803ea76261f50ff299a1bdaac0d07d8834a0cc635d733e41

    SHA512

    d8839872c2a953cf157a363df9aea827415a20aa630d2adb8dd096b70b04c114c4278c7002336d6948c20c6a5dad6eada14788df18f5fa614d4bc4b104febe3f

  • /data/data/com.jekefanesuli.vako/app_engine/DDF.json

    Filesize

    665KB

    MD5

    1ddbd56355948c117b65d8347eab5af9

    SHA1

    3e4ad916b8dbac8c5af0f75d919d8866be80f64e

    SHA256

    96ccc3911f6d7ee4f8efa2f84506f7b5e812cd1fa0cd0ee2b980d5bba7f9902b

    SHA512

    a433a178bd7e0077d8f37af0bd497026a84de7ab78e7f929c7a13a8e722311d33e78f3ebbdf31cfa9945a64d8dad35378d5a2e6b682c932ea102802ae929bd89

  • /data/data/com.jekefanesuli.vako/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.jekefanesuli.vako/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    e6b19878ceaa4dd54129520714ed3615

    SHA1

    4229b13a9d4e35dae1422627dcf8c4f8f5122b2a

    SHA256

    49a8e725e34866d9abe2de31cb7aec11ec6cb5da3d07e2acfe463451220b7890

    SHA512

    3b323a78d325e8d507eae54564e93e8fb02395ce876569102c002ddbccadb00449c2f068856dacb72d14fe126382e521fd4d9cc6b39ea75eb1a054c26fe0a72e

  • /data/data/com.jekefanesuli.vako/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.jekefanesuli.vako/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    7f6fbbc4eaf4d405e03de9ce1d153314

    SHA1

    bb08beb1f23901ede0a4a5df598bb90e85fb17d1

    SHA256

    79252007c5ad1b1ee6f02c737dad6cf865dca57797f86ae1644396bff55b24d1

    SHA512

    ab4afb63ba613d88d9b680ef869b66276dfe4730cb93260dd0aa4a05343b0bb0fb0b2f496f45ec0cd247766f4632a41b743c8ba1f93e2fb2711599c4531d3702

  • /data/data/com.jekefanesuli.vako/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    9a12cdb2a95ab593ec5c0a486cd00e54

    SHA1

    453dcaaf0de1fa2d69409dd9ac61c2363a708655

    SHA256

    bca7416fb30c4deb9260aaaab3df11942b9ae1211f278ba0f23934ad309db379

    SHA512

    6816f583fc354905d1b0d11da68e3db64c150baa8b8cb3b3054b64b18019305d4137e4c7054aa82aa931ab5b882e5bfa220f44779c57c9140df4ac6e11c196e3

  • /data/data/com.jekefanesuli.vako/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    583a5b2840b16ec4a627d651981ca806

    SHA1

    a2c86403cb31066724debb1bb962f082724adb84

    SHA256

    83add154e224112ca03d5b07dadd4655be850a3a088a9e095b58d453e5e83e41

    SHA512

    6e0911b274903acf69caf6098dee8a289f89950c4f7e85d551fe903aa769000df262377e0de8d5e5f9714bbdd328afa363fd74ba6460ba40d7b649d5e835cedf

  • /data/user/0/com.jekefanesuli.vako/app_engine/DDF.json

    Filesize

    1.5MB

    MD5

    acf5c16e023eb0ab3ced9aeb67a8cd4d

    SHA1

    f3283a9282c22e8b6a9286a6412847dcea76eaaa

    SHA256

    b75ea8c86465ddfce7606532f3bb0f682ac8c620ec0372b792af3e4a5df413ff

    SHA512

    83ab6802bdc378ab665cac7ec61bcd5eb4e84e24a2bcb4d3829c39ecd9784e277e31f52b928177c3e2de59e9e7ad5a37602864f53e464a7186bdf2927baa628e