Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
153s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
05/01/2025, 22:01
Behavioral task
behavioral1
Sample
9a35c305a9acaeeb5fafded8eb87e4b17091cf8a9cc95312e6c8d055bc2a8be3.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
9a35c305a9acaeeb5fafded8eb87e4b17091cf8a9cc95312e6c8d055bc2a8be3.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
9a35c305a9acaeeb5fafded8eb87e4b17091cf8a9cc95312e6c8d055bc2a8be3.apk
-
Size
2.1MB
-
MD5
f3caaadbbd007edc71b0f04a3bad0dad
-
SHA1
1b30f3ed5aac994d10285fbcd26be50b8b7b20cd
-
SHA256
9a35c305a9acaeeb5fafded8eb87e4b17091cf8a9cc95312e6c8d055bc2a8be3
-
SHA512
a36d0b3c03d647f37c3d8537afc957df52ac4a7265414561ef6f086caf16d271f80e3d483ecc233ab96b05d2218a2cba5419b8a4bb3b98cb56c48c0e8cb2a561
-
SSDEEP
49152:wgS3eyrj+gBbDZgPTGhUIJlAG/6KPGRo438U7XIijUyF:aj+aHZQGhUIJlAG/6q4MXEUyF
Malware Config
Extracted
ermac
http://154.216.20.225:3434
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac family
-
pid Process 4597 nusku.ermacv2.apk -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId nusku.ermacv2.apk Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId nusku.ermacv2.apk Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText nusku.ermacv2.apk -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener nusku.ermacv2.apk -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock nusku.ermacv2.apk -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground nusku.ermacv2.apk -
Performs UI accessibility actions on behalf of the user 1 TTPs 11 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction nusku.ermacv2.apk android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction nusku.ermacv2.apk android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction nusku.ermacv2.apk android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction nusku.ermacv2.apk android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction nusku.ermacv2.apk android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction nusku.ermacv2.apk android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction nusku.ermacv2.apk android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction nusku.ermacv2.apk android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction nusku.ermacv2.apk android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction nusku.ermacv2.apk android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction nusku.ermacv2.apk -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone nusku.ermacv2.apk -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS nusku.ermacv2.apk -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal nusku.ermacv2.apk -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo nusku.ermacv2.apk -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo nusku.ermacv2.apk
Processes
-
nusku.ermacv2.apk1⤵
- Removes its main activity from the application launcher
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4597
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
707KB
MD5622b17b889a05f78f5257ee774523228
SHA160185ec0470e4cdac266acc92b9e0b61aec7c0c3
SHA256a51074660e56860ab6328d370c7c0a936554e56180cd73629281a425cd6cb77f
SHA512702d8ee5685973c02b807f01094653602c13db31a5381698a5db5c445c210421b9187753966fd88c5dd4fa99d5e556475e17d5f4ac9baf25911552e89ed1b791
-
Filesize
8B
MD5d0cad7824cdb911194689178a2dd652b
SHA148d080570800da79fbab7fb11d2cf7cfb3e68ed9
SHA25658af52870e8d4f2627ac8c42e0b5f7f41357a3526a4c44e28d1d27a86cec2692
SHA5124f75db5bbe93642ac212a216c430b57d5bba009f981615c66e60346441e8ca1f5deb6be0a6d571954031fc06c7bc396913a3354e7bcd5dafbb4c0dfaf264b27b