General

  • Target

    b58aba397abcaed42099ebf7b34bef8b98c7dbdef2a6a0a47478524d7351f49b.bin

  • Size

    2.7MB

  • Sample

    250114-1w6hqatkcj

  • MD5

    62b9641de1f466642cd27bb04dfab99f

  • SHA1

    fa6453e59edfcaa2905f6caa6d7744a4279b0e33

  • SHA256

    b58aba397abcaed42099ebf7b34bef8b98c7dbdef2a6a0a47478524d7351f49b

  • SHA512

    76c207aa922fd9472f28025a33b36db5b150de53f47735005ebff91992dc7403d8b9ecf994d187f1e8008a448c4c5d87507a26de5265212a1b46c6f4f75d6f32

  • SSDEEP

    49152:y5p2a3rgaSLPjVi9P7WaMDM7Mm5zy/sJfj2R4spqHSxl5YDVN7wwfX0GX6d2qh:i2a/KVi1FMDaMZ/slg4mqc5YD30QJXe/

Malware Config

Extracted

Family

ermac

C2

http://154.216.18.137

AES_key
1
374b396842365a4777623946726e3152487379577256426b783361594c704543

Extracted

Family

hook

C2

http://154.216.18.137

AES_key
1
374b396842365a4777623946726e3152487379577256426b783361594c704543

Targets

    • Target

      b58aba397abcaed42099ebf7b34bef8b98c7dbdef2a6a0a47478524d7351f49b.bin

    • Size

      2.7MB

    • MD5

      62b9641de1f466642cd27bb04dfab99f

    • SHA1

      fa6453e59edfcaa2905f6caa6d7744a4279b0e33

    • SHA256

      b58aba397abcaed42099ebf7b34bef8b98c7dbdef2a6a0a47478524d7351f49b

    • SHA512

      76c207aa922fd9472f28025a33b36db5b150de53f47735005ebff91992dc7403d8b9ecf994d187f1e8008a448c4c5d87507a26de5265212a1b46c6f4f75d6f32

    • SSDEEP

      49152:y5p2a3rgaSLPjVi9P7WaMDM7Mm5zy/sJfj2R4spqHSxl5YDVN7wwfX0GX6d2qh:i2a/KVi1FMDaMZ/slg4mqc5YD30QJXe/

    • Ermac

      An Android banking trojan first seen in July 2021.

    • Ermac family

    • Ermac2 payload

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Hook family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Requests accessing notifications (often used to intercept notifications before users become aware).

MITRE ATT&CK Mobile v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.