Analysis

  • max time kernel
    29s
  • max time network
    155s
  • platform
    android_x64
  • resource
    android-x64-20240624-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system
  • submitted
    05-01-2025 22:01

General

  • Target

    e165525d93e01c5ce086981f84383320f8c7f4311dcd9a071e45e99df2583022.apk

  • Size

    4.4MB

  • MD5

    3179804417ace63329e453f1156a05bf

  • SHA1

    69c00664f7324700bdd39dd875bbbc0861cb1752

  • SHA256

    e165525d93e01c5ce086981f84383320f8c7f4311dcd9a071e45e99df2583022

  • SHA512

    3cf9adf8afcddffb0961c2f5b77d550138c689ef1cc33cab7df2d1de22f59ba309eca0fd45bc6deba3444eba484b9ae7ad6c4d004fce4179118af4fceca5ba08

  • SSDEEP

    98304:pansYH+8ZX4aKh5D7Ok4cppM1G9c7iI04nrZ+zhuZb/Vk51GmK22tij+6ca:8neQ3Kh5D7Ok4cppzO04nr8Cb/VWGHBA

Malware Config

Extracted

Family

ermac

C2

http://154.216.20.225:3434

DES_key
AES_key
AES_key

Signatures

  • Ermac

    An Android banking trojan first seen in July 2021.

  • Ermac family
  • Ermac2 payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 13 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.gvupxcnej.ccdwbacjx
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4935

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.gvupxcnej.ccdwbacjx/app_dex/classes.dex

    Filesize

    900KB

    MD5

    6e360bccd6ff3a060b2177e818009ffd

    SHA1

    5723ca9eed39f0dfd3c6ed32c4f2543508dc3005

    SHA256

    289f94dd57ad858f5a44d3e2b74b8fb3ac94587ef4cf8010d3d4931fdcec5c36

    SHA512

    1901c5384257d817d3060560dace82d0f9543d5092350943ccfbff4ada698e30a1ad51be10d0ccddbcb3ed9cdcca30d052bb6daad9bcff2b7dd7fa7d0858866d

  • /data/data/com.gvupxcnej.ccdwbacjx/cache/classes.dex

    Filesize

    443KB

    MD5

    4a0093a31c0b08edea106b457f79d10c

    SHA1

    406362e2c743fd476d8ec699784fc8367a999a8c

    SHA256

    81024b3a6479b7ab4b4241ae6f4f71f9607bfb2b54a9c8bfb17591fa26e96b09

    SHA512

    d966c254c0ea39129de5709195677877bc1c7a36bb68e5f1b3fa8e3a85c50997d90a3b9ed62cd23b61fb7177a28e3dd48a8f512b2d93243bc678daca2c6c1d50

  • /data/data/com.gvupxcnej.ccdwbacjx/cache/classes.zip

    Filesize

    443KB

    MD5

    b3e98f33ccdb309d2008d4337ba2305b

    SHA1

    04f84c4345ca3621c8bd401c2d959074649582f5

    SHA256

    74471f5a98e0af7b2294da47809dee1184cacbc7cf94aed0e9ad265f0dca51d3

    SHA512

    33ff5c8a879c29f583a8241051c27fc1b2df5e281d8b7dbf55a26edacbbe7b1e8e3b35727334bef5dcc9d22adaa221f9c68548a6f6599ffa399690109f702dfc