General

  • Target

    6cebba7466009834500c5ea3b66e54dac6d1d801d9f9a3b66da89c6c767e4fb1.bin

  • Size

    1.1MB

  • Sample

    250112-11btxatqcn

  • MD5

    03a027c44f6c9462f7812fc8985e0958

  • SHA1

    d5228e9ad32b25eb5a38da092795b29e227b47ba

  • SHA256

    6cebba7466009834500c5ea3b66e54dac6d1d801d9f9a3b66da89c6c767e4fb1

  • SHA512

    0fabe4fe95aaf0d1ec801dbc48ebf0ffe2db9e97b45a982b87d00b18426ae4079656ba08048260c5b61adca04bd27aeb67c5782f56fe86893d4381fffeba7f87

  • SSDEEP

    24576:fOg/0I5Oe+BWVmQz+8bHh9y1SOwrW1OGtxLXU7UGVvV:fOg/8XBKoqB9y19Ft5X/YV

Malware Config

Extracted

Family

ermac

C2

http://45.132.181.170:3434

AES_key
AES_key

Targets

    • Target

      6cebba7466009834500c5ea3b66e54dac6d1d801d9f9a3b66da89c6c767e4fb1.bin

    • Size

      1.1MB

    • MD5

      03a027c44f6c9462f7812fc8985e0958

    • SHA1

      d5228e9ad32b25eb5a38da092795b29e227b47ba

    • SHA256

      6cebba7466009834500c5ea3b66e54dac6d1d801d9f9a3b66da89c6c767e4fb1

    • SHA512

      0fabe4fe95aaf0d1ec801dbc48ebf0ffe2db9e97b45a982b87d00b18426ae4079656ba08048260c5b61adca04bd27aeb67c5782f56fe86893d4381fffeba7f87

    • SSDEEP

      24576:fOg/0I5Oe+BWVmQz+8bHh9y1SOwrW1OGtxLXU7UGVvV:fOg/8XBKoqB9y19Ft5X/YV

    • Ermac

      An Android banking trojan first seen in July 2021.

    • Ermac family

    • Removes its main activity from the application launcher

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks