Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    156s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    05/01/2025, 22:01

General

  • Target

    8c7bd84eff98ef5ff2d30ea62c25b89c82f57071093830c42fabd890c01ba4a4.apk

  • Size

    4.4MB

  • MD5

    3fdeb4ae869e32606d9427254f28b3ec

  • SHA1

    6330e9219d8d332ef262275ec0a1080c3c5c9e29

  • SHA256

    8c7bd84eff98ef5ff2d30ea62c25b89c82f57071093830c42fabd890c01ba4a4

  • SHA512

    7e3e3a0e796237314efc8d04359e1cbc3682b97b54d411f6b1ac44e98340f63e6187e13f9766c50d20916f74236c880bd8fa4caccf11bc884b0d325e3e68a64d

  • SSDEEP

    98304:pO0L2CmOy8sZHbXmBcHsrVGrz5Mk6gdwQmHWu9jR:k0ilOy8sZHbXmosr25ZXovT

Malware Config

Extracted

Family

ermac

C2

http://154.216.20.225:3434

DES_key
AES_key
AES_key

Signatures

  • Ermac

    An Android banking trojan first seen in July 2021.

  • Ermac family
  • Ermac2 payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 11 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.crycwuryu.iatckbdom
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4610

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.crycwuryu.iatckbdom/app_dex/classes.dex

    Filesize

    900KB

    MD5

    3af7f0245d45a8fafe8068eda3375a59

    SHA1

    84d7ba84edd4c6c0a61ae6b6275776e3f7b04120

    SHA256

    214589dd2ed718a40ed6c5a5ba7f46e9a8295e4cb1f2e7c7d923612ed548f39e

    SHA512

    f0d0e3f3748e99db54823445d3b817cc8d87347fb68c90ec7631acd763abbe298edd823d62307e8fc0dd4379e80cc1ee45e616219bb3f1582a5ef2423bec579f

  • /data/data/com.crycwuryu.iatckbdom/cache/classes.dex

    Filesize

    443KB

    MD5

    62cc075b3ff4a07c88e0ad476acc0cb7

    SHA1

    211c5a2e2d7ef736197945df9bf164a14e2490c7

    SHA256

    83e09d4bec61170947d4d752d7c187015f5844e7b6bf74c5073a0c8767c91058

    SHA512

    30797c39a4f74ad01e4c66a464e12ae9781c90dec4f5fef60f83329be5fe6b0ee3f62a8476d80c042bde72f064e2b04b16c63fe4ecbdefd2024712c2c0aea660

  • /data/data/com.crycwuryu.iatckbdom/cache/classes.zip

    Filesize

    444KB

    MD5

    c3b275bdd03c4160ddcbe40b00dde484

    SHA1

    3c055aa47ca15928adc9c88e91abd0074a1fe5d6

    SHA256

    0f4437e8bfe88797b06f66e30e8017b6e4a4f2e4ac1a4212b164233e468b2bc0

    SHA512

    cf5ca915b1e37afaac48a5f8307c5bd6259c2df93a9ef8c7f4f170018c318dcd8f7c0dcb0fe5da6711328b2972df90697141047b9a7290412a37a0e2d4fa3d1b