Analysis
-
max time kernel
148s -
max time network
157s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
06-01-2025 22:07
Static task
static1
Behavioral task
behavioral1
Sample
dbb5b90f27222070018a8e029422643a6eb61bf4de0b9855f4af25e0947a07d2.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
dbb5b90f27222070018a8e029422643a6eb61bf4de0b9855f4af25e0947a07d2.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
dbb5b90f27222070018a8e029422643a6eb61bf4de0b9855f4af25e0947a07d2.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
dbb5b90f27222070018a8e029422643a6eb61bf4de0b9855f4af25e0947a07d2.apk
-
Size
3.0MB
-
MD5
27c3e47e5c404b472c332e84aeb7cb0e
-
SHA1
e335dd6e432907c95b05ad85f117f3cf0f22e2e5
-
SHA256
dbb5b90f27222070018a8e029422643a6eb61bf4de0b9855f4af25e0947a07d2
-
SHA512
e871a8171603b3dc4066d7b2f3582fe8a3c14dd3e0c46027c45545eaa3f819d42e7330a8b05e3d5286545a44368c2b81d8a9138452c11a64732e0e27d7e710ad
-
SSDEEP
98304:qzT914BLyLfD8b2g8kdPO3N+oEiXDtpyB4CV1GF:mJibs5YgH
Malware Config
Extracted
ermac
http://85.209.176.208:3434
Extracted
hook
http://85.209.176.208:3434
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac family
-
Ermac2 payload 1 IoCs
resource yara_rule behavioral2/memory/5071-0.dex family_ermac2 -
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.xuzewavuhahi.xomi/app_DynamicOptDex/Ky.json 5071 com.xuzewavuhahi.xomi -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.xuzewavuhahi.xomi Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.xuzewavuhahi.xomi Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.xuzewavuhahi.xomi -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.xuzewavuhahi.xomi -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.xuzewavuhahi.xomi -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.xuzewavuhahi.xomi -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.xuzewavuhahi.xomi -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.xuzewavuhahi.xomi -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.xuzewavuhahi.xomi -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.xuzewavuhahi.xomi -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.xuzewavuhahi.xomi -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.xuzewavuhahi.xomi -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.xuzewavuhahi.xomi -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.xuzewavuhahi.xomi
Processes
-
com.xuzewavuhahi.xomi1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:5071
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
687KB
MD5271a83491c28ee7f01b49d1b8c3ac48b
SHA1283cd5e7685a48a52f6ca0d0775964145d2345f9
SHA256625c9e5cb10250ac8c591ad7b9c8700af064a0a597593720dc9a520878bd01e7
SHA51207824035e500dfd8df43755c542fb6b068ca496b0dc5b8e839320dd3853bc97b4b0af4b642c34b7364db54fa84d97713b9f33b9dc5c4d66777c868d39acefefe
-
Filesize
687KB
MD5ec6b9d8e16ad00340b578dbfe5f1dc6e
SHA1030ebabcc90f78ebff9f87c3b6cfa348a50335e2
SHA256a4725bfb6d51e2e5bae521b55e1c8c74eef85d6b3ef7a38108a7f77f125f6bc9
SHA512c7d648061a26cc8236cff5faf8a828cbf4721ba948a79659cda5290bd2ca47673f0158b81461e91ccc7fa4c5b18c2c22acb51db5645acbe1803d827e51794933
-
Filesize
2KB
MD5e2e3583800bdbe5b22634e4680d85a9d
SHA1b88719d5c6d63e4a404f8588f2498b7c3efef1ea
SHA256ddbaa6870dd229a1aa24359da816160d7cca8c9250d0302a0e7bd3a8fdf4a7f0
SHA512a014e3650fb07572edd950de8f932c9ba924b56fb1ff981b955d25d48429732af1acd7c80949e3e506b55c6d9363d13b73c256b7d9d2ad8c6b48058e4b7ccce2
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5aedf9613397e4d78dfc033e28b5e35eb
SHA1e22d825086c052d0cd8b706e5f1ff9ac86a7e58d
SHA25692ab9aaa922478ed73cdbe33f34ae4bc8d6be3b81584c52b21ed8479f8e93a7a
SHA5124e9aecbb1148e3ad993f558dc6d5774e3e8ea403005dd4776e314dd1ad25797f0d31b20ce581870af498b4e8f9a094e99d3c002743abac9f38e6c7fd3159c86d
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD50d01f31983fea324901fa98bab4e985f
SHA162539f00f3ea4f988ebbfe18070439e45707563e
SHA256e35eecf5c98b086fcc5283733652a1306bbe2f596bcf93124b5195f22c387790
SHA512c81e14875d8595387f360ffe30a2e644d2222552d4669dff42fbb51e8e3fcadf5a11114e3f18625766b4c6f1251422920ae7b850679d62014cd62de8f2eefd02
-
Filesize
108KB
MD5a09c0f91511bc5a399c2b2bbacc9269e
SHA1437bde1b30f3a2233715c01ed724fa91f0cd0463
SHA2561761d29ee916acde170e2e95b7d36056f4b4cb85c8f70663eb8cd26cf3850d5b
SHA512d6cfb8f0d2293583f75ec5c3f7dee898d81db72a61e6001e5edd03a9f8d4aee5ff539c55da46dbccf1a9f5b4be0d58875d304351ed417cabf38eebbd287dc7b2
-
Filesize
173KB
MD5451bf913c9eb29b7d68b9f9304d5bd2c
SHA180d38bcb7ae79a2d04e688f53372cabce389ab2e
SHA2565d879619717e95fdb6325a77d4f17a1012898e7978e5481ba8fe51df39289d50
SHA5127db5b1bdcef24d2d3110e36dd8045c88de4ec26055b8f9ab8c1fb4ba487666cc94625aa19fab6787b4a46d6aadd34efc502e74e4e7e3bba36f8b93f5fc12b4d9
-
Filesize
1.5MB
MD5e473f94a807afbcadec69f9a7d0b0eb0
SHA1be5d9637420e2ed44b63443ee43ac5e1863beb42
SHA256f8432dd80ec113fd2bb3a8e17441bd012910b4bfbbb6b06c8306571f16b030b0
SHA51298311a4cf40cab144840fb924804fffd1b8d76bbd69eaea7aa0746ed86e8aff096efde5793a15a25fb127cf53d2f24af16baec88bb7c0937d2dfab0eea581fed