Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
156s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
05/01/2025, 22:01
Static task
static1
Behavioral task
behavioral1
Sample
8c7bd84eff98ef5ff2d30ea62c25b89c82f57071093830c42fabd890c01ba4a4.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
8c7bd84eff98ef5ff2d30ea62c25b89c82f57071093830c42fabd890c01ba4a4.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
8c7bd84eff98ef5ff2d30ea62c25b89c82f57071093830c42fabd890c01ba4a4.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
8c7bd84eff98ef5ff2d30ea62c25b89c82f57071093830c42fabd890c01ba4a4.apk
-
Size
4.4MB
-
MD5
3fdeb4ae869e32606d9427254f28b3ec
-
SHA1
6330e9219d8d332ef262275ec0a1080c3c5c9e29
-
SHA256
8c7bd84eff98ef5ff2d30ea62c25b89c82f57071093830c42fabd890c01ba4a4
-
SHA512
7e3e3a0e796237314efc8d04359e1cbc3682b97b54d411f6b1ac44e98340f63e6187e13f9766c50d20916f74236c880bd8fa4caccf11bc884b0d325e3e68a64d
-
SSDEEP
98304:pO0L2CmOy8sZHbXmBcHsrVGrz5Mk6gdwQmHWu9jR:k0ilOy8sZHbXmosr25ZXovT
Malware Config
Extracted
ermac
http://154.216.20.225:3434
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac family
-
Ermac2 payload 1 IoCs
resource yara_rule behavioral3/files/fstream-3.dat family_ermac2 -
pid Process 4610 com.crycwuryu.iatckbdom -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.crycwuryu.iatckbdom/app_dex/classes.dex 4610 com.crycwuryu.iatckbdom /data/user/0/com.crycwuryu.iatckbdom/app_dex/classes.dex 4610 com.crycwuryu.iatckbdom -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.crycwuryu.iatckbdom Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.crycwuryu.iatckbdom Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.crycwuryu.iatckbdom -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.crycwuryu.iatckbdom -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.crycwuryu.iatckbdom -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.crycwuryu.iatckbdom -
Performs UI accessibility actions on behalf of the user 1 TTPs 11 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.crycwuryu.iatckbdom android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.crycwuryu.iatckbdom android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.crycwuryu.iatckbdom android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.crycwuryu.iatckbdom android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.crycwuryu.iatckbdom android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.crycwuryu.iatckbdom android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.crycwuryu.iatckbdom android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.crycwuryu.iatckbdom android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.crycwuryu.iatckbdom android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.crycwuryu.iatckbdom android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.crycwuryu.iatckbdom -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.crycwuryu.iatckbdom -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.crycwuryu.iatckbdom -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.crycwuryu.iatckbdom -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.crycwuryu.iatckbdom -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.crycwuryu.iatckbdom
Processes
-
com.crycwuryu.iatckbdom1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4610
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
900KB
MD53af7f0245d45a8fafe8068eda3375a59
SHA184d7ba84edd4c6c0a61ae6b6275776e3f7b04120
SHA256214589dd2ed718a40ed6c5a5ba7f46e9a8295e4cb1f2e7c7d923612ed548f39e
SHA512f0d0e3f3748e99db54823445d3b817cc8d87347fb68c90ec7631acd763abbe298edd823d62307e8fc0dd4379e80cc1ee45e616219bb3f1582a5ef2423bec579f
-
Filesize
443KB
MD562cc075b3ff4a07c88e0ad476acc0cb7
SHA1211c5a2e2d7ef736197945df9bf164a14e2490c7
SHA25683e09d4bec61170947d4d752d7c187015f5844e7b6bf74c5073a0c8767c91058
SHA51230797c39a4f74ad01e4c66a464e12ae9781c90dec4f5fef60f83329be5fe6b0ee3f62a8476d80c042bde72f064e2b04b16c63fe4ecbdefd2024712c2c0aea660
-
Filesize
444KB
MD5c3b275bdd03c4160ddcbe40b00dde484
SHA13c055aa47ca15928adc9c88e91abd0074a1fe5d6
SHA2560f4437e8bfe88797b06f66e30e8017b6e4a4f2e4ac1a4212b164233e468b2bc0
SHA512cf5ca915b1e37afaac48a5f8307c5bd6259c2df93a9ef8c7f4f170018c318dcd8f7c0dcb0fe5da6711328b2972df90697141047b9a7290412a37a0e2d4fa3d1b