Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    android-10_x64
  • resource
    android-x64-20240910-en
  • resource tags

    arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system
  • submitted
    14-01-2025 22:08

General

  • Target

    904422715a4132eddc6f5ca370ee05831f5c821c58abb53d25e0b7de3a9dd4ac.apk

  • Size

    2.6MB

  • MD5

    be161c7c4b23890809618d9830a543ec

  • SHA1

    b0993da4e434ecd60082603107dfdf50b196aa5f

  • SHA256

    904422715a4132eddc6f5ca370ee05831f5c821c58abb53d25e0b7de3a9dd4ac

  • SHA512

    e6cedbdbff09aca5accdb53759ada0d33e3fde449c3f0812f6ea8ba77444a95cd7e363ee91d1b59886cb2e8c56a9585632b4bb1da40590dae6a51ba91b4fda9c

  • SSDEEP

    49152:p/eSCbqzGXqaziXNaJj+fe3j4LQ4fW1WONz/1b/+oEjYVP+f:FeXbRRiXN+3j4LYTbG2s

Malware Config

Extracted

Family

ermac

C2

http://45.141.85.25:3434

AES_key
AES_key

Signatures

  • Ermac

    An Android banking trojan first seen in July 2021.

  • Ermac family
  • Ermac2 payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 11 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.zixudahitifo.gicu
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:5052

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.zixudahitifo.gicu/app_DynamicOptDex/XLLexK.json

    Filesize

    445KB

    MD5

    c0f1b37b9dda7e057f5d42c8e2604420

    SHA1

    4627843ae783c43434207f90863bdbec253a1645

    SHA256

    18000a3206695ff43dccedd072485b8f05221d6fe34e75d244ad3b9bfc3d32b0

    SHA512

    b549f201c911d7a422663334c4a20bb28e619468e4520609a353b46df539e371d0fac8f08d4cfb586cc778ad528390ccd2f4f6d9bee921c44b71a0a3cc050f80

  • /data/data/com.zixudahitifo.gicu/app_DynamicOptDex/XLLexK.json

    Filesize

    445KB

    MD5

    87af5b5f9f9d6f51025e51d8c2a9b16a

    SHA1

    f31297a09ca231d25442908b198c076c0df9ff8c

    SHA256

    9dae4db917d2897d3f5cea43b8280ca0373118332b07782b487d829262d64539

    SHA512

    7e5004b2e25b48e553f77f3e72fd863c71617dcb17a1a9ea1c8cfd7c4176945f1919c618d0b077a6b470a273a8ea08813d163907d832bfc07e5316b3996ee33b

  • /data/data/com.zixudahitifo.gicu/app_DynamicOptDex/oat/XLLexK.json.cur.prof

    Filesize

    594B

    MD5

    7205cfa4485b5979e070c1c882ff4e05

    SHA1

    bad6ecbf4c1ab37ddb65b49b4ab4f71d81d55993

    SHA256

    3b67f832c1e723086b021989d007f14237c04f982e8d6554f36d044ce2473d71

    SHA512

    97b94c922326df4549065d57f658b3684f832a450718a0c70df51b2de5e1e1d622e6ad16b5f7d73b7b5de703f92e07f75685d37cadc3c06b1d593a305fc5a4d4

  • /data/user/0/com.zixudahitifo.gicu/app_DynamicOptDex/XLLexK.json

    Filesize

    877KB

    MD5

    c6470c5c0c03d4966568128160294363

    SHA1

    884af0b8dd15928ff2e9de39ff90fc02bf72ae5e

    SHA256

    438d81717253770e51cd32c40f60df6566e9941f36293c6bfb9904ffbefe7827

    SHA512

    a8d5d53398da1e9fe0229c6f3d7b483f6747168900f9b58090be4e760b14ca4dbb416a4fe650cbcce38e20142a8e6260d13fda88e11db7852e1966f7d66069e9