General

  • Target

    93d771f373872a4c6f589dc7596dab9ec900c12a9d3bd166b4b6c42e64790d54.bin

  • Size

    1013KB

  • Sample

    250112-11qm3atqen

  • MD5

    2b2351eccbbd650d49e8b77d84c1c3b9

  • SHA1

    4468a72413a29cd16c99459bd6815dd8e696ade3

  • SHA256

    93d771f373872a4c6f589dc7596dab9ec900c12a9d3bd166b4b6c42e64790d54

  • SHA512

    cff95213661b2caa8886704e096217995e10764bc8048947de4d66786d67be5d17ab7d7024f07b7ef0e16ccb02826a9ef172bc9df24fc42581f86f63311a7035

  • SSDEEP

    24576:bIdIMp9FiIsH3ws5kVw1bb8LTlc/zTzSyjg3g/4B/Z:sdIMHFi13f5k+FxWy03g/4r

Malware Config

Extracted

Family

ermac

C2

http://172.93.100.16:3434

AES_key
AES_key

Targets

    • Target

      93d771f373872a4c6f589dc7596dab9ec900c12a9d3bd166b4b6c42e64790d54.bin

    • Size

      1013KB

    • MD5

      2b2351eccbbd650d49e8b77d84c1c3b9

    • SHA1

      4468a72413a29cd16c99459bd6815dd8e696ade3

    • SHA256

      93d771f373872a4c6f589dc7596dab9ec900c12a9d3bd166b4b6c42e64790d54

    • SHA512

      cff95213661b2caa8886704e096217995e10764bc8048947de4d66786d67be5d17ab7d7024f07b7ef0e16ccb02826a9ef172bc9df24fc42581f86f63311a7035

    • SSDEEP

      24576:bIdIMp9FiIsH3ws5kVw1bb8LTlc/zTzSyjg3g/4B/Z:sdIMHFi13f5k+FxWy03g/4r

    • Ermac

      An Android banking trojan first seen in July 2021.

    • Ermac family

    • Removes its main activity from the application launcher

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks