Analysis

  • max time kernel
    149s
  • max time network
    159s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    14-01-2025 22:01

General

  • Target

    b58aba397abcaed42099ebf7b34bef8b98c7dbdef2a6a0a47478524d7351f49b.apk

  • Size

    2.7MB

  • MD5

    62b9641de1f466642cd27bb04dfab99f

  • SHA1

    fa6453e59edfcaa2905f6caa6d7744a4279b0e33

  • SHA256

    b58aba397abcaed42099ebf7b34bef8b98c7dbdef2a6a0a47478524d7351f49b

  • SHA512

    76c207aa922fd9472f28025a33b36db5b150de53f47735005ebff91992dc7403d8b9ecf994d187f1e8008a448c4c5d87507a26de5265212a1b46c6f4f75d6f32

  • SSDEEP

    49152:y5p2a3rgaSLPjVi9P7WaMDM7Mm5zy/sJfj2R4spqHSxl5YDVN7wwfX0GX6d2qh:i2a/KVi1FMDaMZ/slg4mqc5YD30QJXe/

Malware Config

Extracted

Family

ermac

C2

http://154.216.18.137

AES_key

Extracted

Family

hook

C2

http://154.216.18.137

AES_key

Signatures

  • Ermac

    An Android banking trojan first seen in July 2021.

  • Ermac family
  • Ermac2 payload 1 IoCs
  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 19 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.zzkasaslkasata.kuri
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4765

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.zzkasaslkasata.kuri/app_drip/mRNHWd.json

    Filesize

    736KB

    MD5

    8b6c73d0a2aa321394cfc51e85881cce

    SHA1

    15978d65e2b7dc950743b533119648803fa52673

    SHA256

    d40b773c104a3590e5f5d1e6f8438ace5cf168db965a77e5e2cfc7a326afe721

    SHA512

    45de74a2c0bd82c3ecf3980810196daaeb4bcf829782005ee1cd174eb3e5104c95eea116157441389305f40a3029514f4b28faa7bb1b0aad343d520710eb9bc1

  • /data/data/com.zzkasaslkasata.kuri/app_drip/mRNHWd.json

    Filesize

    736KB

    MD5

    cc89e32f2ce0756c4fc6be242b0c8bda

    SHA1

    fa0e843a6209db6b321ba80a978eaea744a7458e

    SHA256

    d17d65e64c8e7bce294b7d02f3f79c9ce8a6448c08755f7fe69a932fa54bede1

    SHA512

    5c5a2bb39c7641c2993a10ab5f737ff6b1dc8a99f26a647385ff497495f7b745c5f8441a572f9bd14f6c791afc920afeed2d2b576ba413b092e80ae616647244

  • /data/data/com.zzkasaslkasata.kuri/app_drip/oat/mRNHWd.json.cur.prof

    Filesize

    3KB

    MD5

    4d49234bbfc6a21f681ff813dca00bc1

    SHA1

    2eb62cac63f8c19e1bc272ca2359de489932ab57

    SHA256

    be7b44fc64de772da7f700a1230c3ba477614ef9bd426a5a6c7a4c63708ec914

    SHA512

    f87802b72ecba7fdc925191396f926cf6ca643385dfad451711780f885e6bacb1ebe56668f33017947a6fb0369ddd40c4dd6bbc16b59e0a7f0a4daec0ab9419e

  • /data/data/com.zzkasaslkasata.kuri/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.zzkasaslkasata.kuri/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    b4a14a4bbfbf9ecb3c30b481302f36d9

    SHA1

    b7aa020883414b4b83cd7df3fd361b5da9a5e7b9

    SHA256

    4bbf8d1d1d633df4393eae7ab1ddaefee8757fd0b9913dbf88b7bae2f157f42d

    SHA512

    82073be6e6aaecde5c788b76eb103c07fc76e3a6cab61ae8af602674ebeec5f86f887f79aeec2c8cd298448ddefc459a5553f4fd0d5cc4230976f90e16051f13

  • /data/data/com.zzkasaslkasata.kuri/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.zzkasaslkasata.kuri/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    652a13d1ac96273c4941fc363cde2de9

    SHA1

    cf1cf9ab5b6633abc3ad5340cdb394af6cd2fed0

    SHA256

    d6be1876eb24f4187f0fcbc4ef5b3e29ab10c02b03476ccf3e8be66c379190b8

    SHA512

    86b015dca1153125e4d7f6c80ea503bfc74062c1c754fa9d4d97942bf2a783164f56861426b36751002b3753463afc8959d0920774caa24c5c5f1092e64599fd

  • /data/data/com.zzkasaslkasata.kuri/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    6ee99783397db2a88c4ac2c8fa5fcb25

    SHA1

    6569a3832c7c9e3be364dad7d16efb6acce636c1

    SHA256

    cd9402728ea74f2d13288e9ecb7c7984e25361f0a4fcc7912b41b64766194d88

    SHA512

    31eacd72efbb72b478a614cd5727895ab5287d5df269c4a8da780d9422aca417ea7a12a1b47e474d48065f9354fe3709b58b239f0e65d6872e7d76da8ad4ac08

  • /data/data/com.zzkasaslkasata.kuri/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    47292d28296e00cb894043a40c8345f0

    SHA1

    83d512866e6ac149b08f8fd608e8a6b3ba7f5fdb

    SHA256

    0ad8ce0ec599b3edd8cf18a3b78fe12660419e959107a3253f1c831dae925ce6

    SHA512

    a523911aa2306416ec2ccbb13018250aca7b2a42fa51a5b6bec0b9ee3dc29227abaf55a554112c799c147c7f05ff620f974a42b2f76a2a8dea31d2b18841c862

  • /data/user/0/com.zzkasaslkasata.kuri/app_drip/mRNHWd.json

    Filesize

    1.7MB

    MD5

    1ddedde67f70d4941da285e210da50a2

    SHA1

    939e3501285edf555d648284998df8be9f1f97ef

    SHA256

    da4946dcb546e0db61339cd3d0e8129cea24091700f6fc627bf32872d3f7c5c7

    SHA512

    7e32ee928ebbb34e56d55edd7058ed9e886891a24a41e6f4882258046bb5b2a16548743bd8945932e977e29fb47a564f022d9e1f5a435d5ab8a8141501c6a3ef