Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    05/01/2025, 22:01

General

  • Target

    8c7bd84eff98ef5ff2d30ea62c25b89c82f57071093830c42fabd890c01ba4a4.apk

  • Size

    4.4MB

  • MD5

    3fdeb4ae869e32606d9427254f28b3ec

  • SHA1

    6330e9219d8d332ef262275ec0a1080c3c5c9e29

  • SHA256

    8c7bd84eff98ef5ff2d30ea62c25b89c82f57071093830c42fabd890c01ba4a4

  • SHA512

    7e3e3a0e796237314efc8d04359e1cbc3682b97b54d411f6b1ac44e98340f63e6187e13f9766c50d20916f74236c880bd8fa4caccf11bc884b0d325e3e68a64d

  • SSDEEP

    98304:pO0L2CmOy8sZHbXmBcHsrVGrz5Mk6gdwQmHWu9jR:k0ilOy8sZHbXmosr25ZXovT

Malware Config

Extracted

Family

ermac

C2

http://154.216.20.225:3434

DES_key
AES_key
AES_key

Signatures

  • Ermac

    An Android banking trojan first seen in July 2021.

  • Ermac family
  • Ermac2 payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 19 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.crycwuryu.iatckbdom
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4214
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.crycwuryu.iatckbdom/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.crycwuryu.iatckbdom/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4242

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.crycwuryu.iatckbdom/app_dex/classes.dex

    Filesize

    900KB

    MD5

    3af7f0245d45a8fafe8068eda3375a59

    SHA1

    84d7ba84edd4c6c0a61ae6b6275776e3f7b04120

    SHA256

    214589dd2ed718a40ed6c5a5ba7f46e9a8295e4cb1f2e7c7d923612ed548f39e

    SHA512

    f0d0e3f3748e99db54823445d3b817cc8d87347fb68c90ec7631acd763abbe298edd823d62307e8fc0dd4379e80cc1ee45e616219bb3f1582a5ef2423bec579f

  • /data/data/com.crycwuryu.iatckbdom/cache/classes.dex

    Filesize

    443KB

    MD5

    62cc075b3ff4a07c88e0ad476acc0cb7

    SHA1

    211c5a2e2d7ef736197945df9bf164a14e2490c7

    SHA256

    83e09d4bec61170947d4d752d7c187015f5844e7b6bf74c5073a0c8767c91058

    SHA512

    30797c39a4f74ad01e4c66a464e12ae9781c90dec4f5fef60f83329be5fe6b0ee3f62a8476d80c042bde72f064e2b04b16c63fe4ecbdefd2024712c2c0aea660

  • /data/data/com.crycwuryu.iatckbdom/cache/classes.zip

    Filesize

    444KB

    MD5

    c3b275bdd03c4160ddcbe40b00dde484

    SHA1

    3c055aa47ca15928adc9c88e91abd0074a1fe5d6

    SHA256

    0f4437e8bfe88797b06f66e30e8017b6e4a4f2e4ac1a4212b164233e468b2bc0

    SHA512

    cf5ca915b1e37afaac48a5f8307c5bd6259c2df93a9ef8c7f4f170018c318dcd8f7c0dcb0fe5da6711328b2972df90697141047b9a7290412a37a0e2d4fa3d1b

  • /data/user/0/com.crycwuryu.iatckbdom/app_dex/classes.dex

    Filesize

    900KB

    MD5

    98552c116a820ac4468db92f7abb1244

    SHA1

    66b41e68bf7bac135da488a218231d9cfc9b7a2a

    SHA256

    d378ccba28f23727eb6889b42e90436ffcecaef62557b0bf330c1a258966ffb7

    SHA512

    a105a221fe37c04b7e711792c52a32ca4f023e920723ef0f369ecc40536fa4a6a0c147cb5fc4f3653d85daac7cfdff5a9c5b234718e765f91c8fe33541c91e59