Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
25s -
max time network
158s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
04/01/2025, 22:00
Static task
static1
Behavioral task
behavioral1
Sample
edb8acd104ad2427a79922d07f9419580fd9aeb746f940422851b431ff61b48d.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
edb8acd104ad2427a79922d07f9419580fd9aeb746f940422851b431ff61b48d.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
edb8acd104ad2427a79922d07f9419580fd9aeb746f940422851b431ff61b48d.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
edb8acd104ad2427a79922d07f9419580fd9aeb746f940422851b431ff61b48d.apk
-
Size
3.3MB
-
MD5
2a884cd0c07e28a58aef5abe799f34d9
-
SHA1
966488faebce0d98b9be6d8705577a894fdcacc8
-
SHA256
edb8acd104ad2427a79922d07f9419580fd9aeb746f940422851b431ff61b48d
-
SHA512
f0ad86beb094c1ad938efeba180cc145bc8f30d82169579850fa461985d9e49606d6dc4148600224796f63eecc9dc4bca1084168fd73dd9776ee490538e23df4
-
SSDEEP
98304:H2UARrIK9eUk8spO1w93yRunnkC9tyzgZLaQYEy:ARrzdrspO1cMukCeUxfYEy
Malware Config
Extracted
ermac
Extracted
hook
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac family
-
Ermac2 payload 1 IoCs
resource yara_rule behavioral2/memory/4930-0.dex family_ermac2 -
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.jekefanesuli.vako/app_engine/DDF.json 4930 com.jekefanesuli.vako -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.jekefanesuli.vako Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.jekefanesuli.vako Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.jekefanesuli.vako -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.jekefanesuli.vako -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.jekefanesuli.vako -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.jekefanesuli.vako -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.jekefanesuli.vako -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.jekefanesuli.vako -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.jekefanesuli.vako -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.jekefanesuli.vako -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.jekefanesuli.vako -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.jekefanesuli.vako -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.jekefanesuli.vako -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.jekefanesuli.vako
Processes
-
com.jekefanesuli.vako1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4930
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
665KB
MD522e240b36c2b8848165d8caf97262510
SHA1daaed9d2f94539cc5e9770484b95df68fdd6195e
SHA256ef216fd44a958ee9803ea76261f50ff299a1bdaac0d07d8834a0cc635d733e41
SHA512d8839872c2a953cf157a363df9aea827415a20aa630d2adb8dd096b70b04c114c4278c7002336d6948c20c6a5dad6eada14788df18f5fa614d4bc4b104febe3f
-
Filesize
665KB
MD51ddbd56355948c117b65d8347eab5af9
SHA13e4ad916b8dbac8c5af0f75d919d8866be80f64e
SHA25696ccc3911f6d7ee4f8efa2f84506f7b5e812cd1fa0cd0ee2b980d5bba7f9902b
SHA512a433a178bd7e0077d8f37af0bd497026a84de7ab78e7f929c7a13a8e722311d33e78f3ebbdf31cfa9945a64d8dad35378d5a2e6b682c932ea102802ae929bd89
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5e6b19878ceaa4dd54129520714ed3615
SHA14229b13a9d4e35dae1422627dcf8c4f8f5122b2a
SHA25649a8e725e34866d9abe2de31cb7aec11ec6cb5da3d07e2acfe463451220b7890
SHA5123b323a78d325e8d507eae54564e93e8fb02395ce876569102c002ddbccadb00449c2f068856dacb72d14fe126382e521fd4d9cc6b39ea75eb1a054c26fe0a72e
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD57f6fbbc4eaf4d405e03de9ce1d153314
SHA1bb08beb1f23901ede0a4a5df598bb90e85fb17d1
SHA25679252007c5ad1b1ee6f02c737dad6cf865dca57797f86ae1644396bff55b24d1
SHA512ab4afb63ba613d88d9b680ef869b66276dfe4730cb93260dd0aa4a05343b0bb0fb0b2f496f45ec0cd247766f4632a41b743c8ba1f93e2fb2711599c4531d3702
-
Filesize
108KB
MD59a12cdb2a95ab593ec5c0a486cd00e54
SHA1453dcaaf0de1fa2d69409dd9ac61c2363a708655
SHA256bca7416fb30c4deb9260aaaab3df11942b9ae1211f278ba0f23934ad309db379
SHA5126816f583fc354905d1b0d11da68e3db64c150baa8b8cb3b3054b64b18019305d4137e4c7054aa82aa931ab5b882e5bfa220f44779c57c9140df4ac6e11c196e3
-
Filesize
173KB
MD5583a5b2840b16ec4a627d651981ca806
SHA1a2c86403cb31066724debb1bb962f082724adb84
SHA25683add154e224112ca03d5b07dadd4655be850a3a088a9e095b58d453e5e83e41
SHA5126e0911b274903acf69caf6098dee8a289f89950c4f7e85d551fe903aa769000df262377e0de8d5e5f9714bbdd328afa363fd74ba6460ba40d7b649d5e835cedf
-
Filesize
1.5MB
MD5acf5c16e023eb0ab3ced9aeb67a8cd4d
SHA1f3283a9282c22e8b6a9286a6412847dcea76eaaa
SHA256b75ea8c86465ddfce7606532f3bb0f682ac8c620ec0372b792af3e4a5df413ff
SHA51283ab6802bdc378ab665cac7ec61bcd5eb4e84e24a2bcb4d3829c39ecd9784e277e31f52b928177c3e2de59e9e7ad5a37602864f53e464a7186bdf2927baa628e