Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    14-01-2025 22:08

General

  • Target

    904422715a4132eddc6f5ca370ee05831f5c821c58abb53d25e0b7de3a9dd4ac.apk

  • Size

    2.6MB

  • MD5

    be161c7c4b23890809618d9830a543ec

  • SHA1

    b0993da4e434ecd60082603107dfdf50b196aa5f

  • SHA256

    904422715a4132eddc6f5ca370ee05831f5c821c58abb53d25e0b7de3a9dd4ac

  • SHA512

    e6cedbdbff09aca5accdb53759ada0d33e3fde449c3f0812f6ea8ba77444a95cd7e363ee91d1b59886cb2e8c56a9585632b4bb1da40590dae6a51ba91b4fda9c

  • SSDEEP

    49152:p/eSCbqzGXqaziXNaJj+fe3j4LQ4fW1WONz/1b/+oEjYVP+f:FeXbRRiXN+3j4LYTbG2s

Malware Config

Extracted

Family

ermac

C2

http://45.141.85.25:3434

AES_key
AES_key

Signatures

  • Ermac

    An Android banking trojan first seen in July 2021.

  • Ermac family
  • Ermac2 payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Checks Android system properties for emulator presence. 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.zixudahitifo.gicu
    1⤵
    • Removes its main activity from the application launcher
    • Checks Android system properties for emulator presence.
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4212
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.zixudahitifo.gicu/app_DynamicOptDex/XLLexK.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.zixudahitifo.gicu/app_DynamicOptDex/oat/x86/XLLexK.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4238

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.zixudahitifo.gicu/app_DynamicOptDex/XLLexK.json

    Filesize

    445KB

    MD5

    c0f1b37b9dda7e057f5d42c8e2604420

    SHA1

    4627843ae783c43434207f90863bdbec253a1645

    SHA256

    18000a3206695ff43dccedd072485b8f05221d6fe34e75d244ad3b9bfc3d32b0

    SHA512

    b549f201c911d7a422663334c4a20bb28e619468e4520609a353b46df539e371d0fac8f08d4cfb586cc778ad528390ccd2f4f6d9bee921c44b71a0a3cc050f80

  • /data/data/com.zixudahitifo.gicu/app_DynamicOptDex/XLLexK.json

    Filesize

    445KB

    MD5

    87af5b5f9f9d6f51025e51d8c2a9b16a

    SHA1

    f31297a09ca231d25442908b198c076c0df9ff8c

    SHA256

    9dae4db917d2897d3f5cea43b8280ca0373118332b07782b487d829262d64539

    SHA512

    7e5004b2e25b48e553f77f3e72fd863c71617dcb17a1a9ea1c8cfd7c4176945f1919c618d0b077a6b470a273a8ea08813d163907d832bfc07e5316b3996ee33b

  • /data/data/com.zixudahitifo.gicu/app_DynamicOptDex/oat/XLLexK.json.cur.prof

    Filesize

    636B

    MD5

    a28708a7edfe2f3bb92e80e4b7e90d21

    SHA1

    c0d8632ad26c4b82f1e3f0518633c8ba413f0864

    SHA256

    dbea02ce6dc080be8be7e7464683c92595ab720e48c538b59fd49461c77a56e2

    SHA512

    be5eb67d80d71ac66406c16d7404686307fc926852d7aa14ba82a6d78679ca09da450671c9f22f91961bf405a3efbff94172e8aafbaa7797f04f6b47b96667a3

  • /data/user/0/com.zixudahitifo.gicu/app_DynamicOptDex/XLLexK.json

    Filesize

    877KB

    MD5

    382dd91d90acd23287374c86162f2eab

    SHA1

    3878f89ef816b2f216311a467bcd6157c8a4d468

    SHA256

    c23f35f6250f1c9c7973c71f186a16ea4f169fc651ae1e90783189d7761f0353

    SHA512

    7a7ecc85ee00417ba6a082a54dadc2111281c9352e06079ef2d621fcd699bf667cbe3e3b21209c9660b8f3a00fff5751b5eb98d65558db1b1fdf6182c1a66279

  • /data/user/0/com.zixudahitifo.gicu/app_DynamicOptDex/XLLexK.json

    Filesize

    877KB

    MD5

    c6470c5c0c03d4966568128160294363

    SHA1

    884af0b8dd15928ff2e9de39ff90fc02bf72ae5e

    SHA256

    438d81717253770e51cd32c40f60df6566e9941f36293c6bfb9904ffbefe7827

    SHA512

    a8d5d53398da1e9fe0229c6f3d7b483f6747168900f9b58090be4e760b14ca4dbb416a4fe650cbcce38e20142a8e6260d13fda88e11db7852e1966f7d66069e9