Analysis
-
max time kernel
148s -
max time network
151s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
14-01-2025 22:08
Static task
static1
Behavioral task
behavioral1
Sample
904422715a4132eddc6f5ca370ee05831f5c821c58abb53d25e0b7de3a9dd4ac.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
904422715a4132eddc6f5ca370ee05831f5c821c58abb53d25e0b7de3a9dd4ac.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
904422715a4132eddc6f5ca370ee05831f5c821c58abb53d25e0b7de3a9dd4ac.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
904422715a4132eddc6f5ca370ee05831f5c821c58abb53d25e0b7de3a9dd4ac.apk
-
Size
2.6MB
-
MD5
be161c7c4b23890809618d9830a543ec
-
SHA1
b0993da4e434ecd60082603107dfdf50b196aa5f
-
SHA256
904422715a4132eddc6f5ca370ee05831f5c821c58abb53d25e0b7de3a9dd4ac
-
SHA512
e6cedbdbff09aca5accdb53759ada0d33e3fde449c3f0812f6ea8ba77444a95cd7e363ee91d1b59886cb2e8c56a9585632b4bb1da40590dae6a51ba91b4fda9c
-
SSDEEP
49152:p/eSCbqzGXqaziXNaJj+fe3j4LQ4fW1WONz/1b/+oEjYVP+f:FeXbRRiXN+3j4LYTbG2s
Malware Config
Extracted
ermac
http://45.141.85.25:3434
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac family
-
Ermac2 payload 2 IoCs
resource yara_rule behavioral1/memory/4238-0.dex family_ermac2 behavioral1/memory/4212-0.dex family_ermac2 -
pid Process 4212 com.zixudahitifo.gicu -
Checks Android system properties for emulator presence. 1 TTPs 1 IoCs
description ioc Process Accessed system property key: ro.product.model com.zixudahitifo.gicu -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.zixudahitifo.gicu/app_DynamicOptDex/XLLexK.json 4238 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.zixudahitifo.gicu/app_DynamicOptDex/XLLexK.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.zixudahitifo.gicu/app_DynamicOptDex/oat/x86/XLLexK.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.zixudahitifo.gicu/app_DynamicOptDex/XLLexK.json 4212 com.zixudahitifo.gicu -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.zixudahitifo.gicu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.zixudahitifo.gicu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.zixudahitifo.gicu -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.zixudahitifo.gicu -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.zixudahitifo.gicu -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.zixudahitifo.gicu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.zixudahitifo.gicu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.zixudahitifo.gicu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.zixudahitifo.gicu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.zixudahitifo.gicu -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.zixudahitifo.gicu -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.zixudahitifo.gicu -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.zixudahitifo.gicu -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.zixudahitifo.gicu -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.zixudahitifo.gicu -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.zixudahitifo.gicu
Processes
-
com.zixudahitifo.gicu1⤵
- Removes its main activity from the application launcher
- Checks Android system properties for emulator presence.
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4212 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.zixudahitifo.gicu/app_DynamicOptDex/XLLexK.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.zixudahitifo.gicu/app_DynamicOptDex/oat/x86/XLLexK.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4238
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
3System Checks
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
445KB
MD5c0f1b37b9dda7e057f5d42c8e2604420
SHA14627843ae783c43434207f90863bdbec253a1645
SHA25618000a3206695ff43dccedd072485b8f05221d6fe34e75d244ad3b9bfc3d32b0
SHA512b549f201c911d7a422663334c4a20bb28e619468e4520609a353b46df539e371d0fac8f08d4cfb586cc778ad528390ccd2f4f6d9bee921c44b71a0a3cc050f80
-
Filesize
445KB
MD587af5b5f9f9d6f51025e51d8c2a9b16a
SHA1f31297a09ca231d25442908b198c076c0df9ff8c
SHA2569dae4db917d2897d3f5cea43b8280ca0373118332b07782b487d829262d64539
SHA5127e5004b2e25b48e553f77f3e72fd863c71617dcb17a1a9ea1c8cfd7c4176945f1919c618d0b077a6b470a273a8ea08813d163907d832bfc07e5316b3996ee33b
-
Filesize
636B
MD5a28708a7edfe2f3bb92e80e4b7e90d21
SHA1c0d8632ad26c4b82f1e3f0518633c8ba413f0864
SHA256dbea02ce6dc080be8be7e7464683c92595ab720e48c538b59fd49461c77a56e2
SHA512be5eb67d80d71ac66406c16d7404686307fc926852d7aa14ba82a6d78679ca09da450671c9f22f91961bf405a3efbff94172e8aafbaa7797f04f6b47b96667a3
-
Filesize
877KB
MD5382dd91d90acd23287374c86162f2eab
SHA13878f89ef816b2f216311a467bcd6157c8a4d468
SHA256c23f35f6250f1c9c7973c71f186a16ea4f169fc651ae1e90783189d7761f0353
SHA5127a7ecc85ee00417ba6a082a54dadc2111281c9352e06079ef2d621fcd699bf667cbe3e3b21209c9660b8f3a00fff5751b5eb98d65558db1b1fdf6182c1a66279
-
Filesize
877KB
MD5c6470c5c0c03d4966568128160294363
SHA1884af0b8dd15928ff2e9de39ff90fc02bf72ae5e
SHA256438d81717253770e51cd32c40f60df6566e9941f36293c6bfb9904ffbefe7827
SHA512a8d5d53398da1e9fe0229c6f3d7b483f6747168900f9b58090be4e760b14ca4dbb416a4fe650cbcce38e20142a8e6260d13fda88e11db7852e1966f7d66069e9