Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    14-01-2025 22:02

General

  • Target

    a2acdcb1d115e9c73e74aff890d25027c4351cdf4b26a8cb2f4c113fc38961a9.apk

  • Size

    3.4MB

  • MD5

    b96a9a7f7a33102c7b485a523325f651

  • SHA1

    e7f19f92b098cbbcb988027a2c5965949bdb1a5a

  • SHA256

    a2acdcb1d115e9c73e74aff890d25027c4351cdf4b26a8cb2f4c113fc38961a9

  • SHA512

    26d67294b4cd14ff40ddfe061a5a60314776107ea92c10237fdb32adda4d874d2699ea9df59ddadc7e6f9ecd11a640fc79bd7ea7528907a783fac4e4807e4f0a

  • SSDEEP

    98304:Xmz66kb+7mG+0yZgTRcLpQ2L0ubDtricFL0:gz7mGjyZ1Q2wuvtW00

Malware Config

Extracted

Family

ermac

C2

http://154.216.17.69

AES_key

Extracted

Family

hook

C2

http://154.216.17.69

AES_key

Signatures

  • Ermac

    An Android banking trojan first seen in July 2021.

  • Ermac family
  • Ermac2 payload 2 IoCs
  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.fsaslkasata.kuri
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4336
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.fsaslkasata.kuri/app_sheriff/qmjpQI.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.fsaslkasata.kuri/app_sheriff/oat/x86/qmjpQI.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4362

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.fsaslkasata.kuri/app_sheriff/oat/qmjpQI.json.cur.prof

    Filesize

    3KB

    MD5

    80cece1c81df55fc01e375c7aa80ff26

    SHA1

    6a76f8c6116ec566e7c2fd3bc8b36768be11c9f5

    SHA256

    a77507cd6ced12c96e7cad69ff0ab1e540d4ac3e31dec95b79e91c0427d9d46b

    SHA512

    cdb2f2517f6c94485112065dcdfe8ee2587468631aadea2e03b2c6c1a7b7aef62c2e5a5023f809f6abc58c618744f0dc099c19551e522083db809a5c005ac086

  • /data/data/com.fsaslkasata.kuri/app_sheriff/qmjpQI.json

    Filesize

    735KB

    MD5

    538cb94ad1e7f7fc7510ad35fc7e23cb

    SHA1

    b4e37ae6d26c2ca2633a77904e56ec1a734d6440

    SHA256

    59ec419a9d3f8b308ffc6c0fe5bf1cf515c70e4cc079d06bf2e37cba4ea763ff

    SHA512

    877801f5befe1d02b454ecdc885d8d1932703fed2f563759bc03d15001d21755ffe61928e7aa020e7a2a779bf6ef0c97ef9cf353040fa3173e8ff2146b2baddf

  • /data/data/com.fsaslkasata.kuri/app_sheriff/qmjpQI.json

    Filesize

    735KB

    MD5

    b6022d081b7666e0900a298818fbf802

    SHA1

    08630c96c97173d739ab2dfdaaf41fb3accde33d

    SHA256

    684ea431a812e475acf24884e04f0d9b797b156289ebab24670452419563c5cf

    SHA512

    3707deea5cdd8fdf94a88deb02ee731a8e55bd5c0ff90a4794e4c7efa10e31fa8bddfea88bb19e99142a5544431662da13d773a3079abb18c26e84b33dcb06b4

  • /data/data/com.fsaslkasata.kuri/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.fsaslkasata.kuri/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    8fe8e4fafa6014057c562bb0b50fd83c

    SHA1

    74c1e4c8c9af05fef91b44a2bbf748fdef367bf8

    SHA256

    69e3eb889ebe7bd071fb9e4536b8b3ca2f9d6cf91b54a562ab4b126e3c6bfa40

    SHA512

    be0c89b83d8a88903804864a73152a175994aca9598a46ba9ebda286d96d90632a978b2c5b3ba72228a1ae63505f9d21119ab48ea7e84a078947921922d93a03

  • /data/data/com.fsaslkasata.kuri/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.fsaslkasata.kuri/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    0760c28d9d4bba78df755da9353d9ed6

    SHA1

    e7ae862324b712a168c4ce7c731d3b9f15f0cca8

    SHA256

    95967927da10556df6fdbb14bc74e4a0c980f33cb44b9d7a6bd4305da8b421bd

    SHA512

    096c596260d09fe630572582c341a89e7e85605781a9cb51a6eb411958e7e4f71bf7e930bbdba5efe49daafa59666664f8c3b3afd3e563a1e496776a5bfd9577

  • /data/data/com.fsaslkasata.kuri/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    224b56cb0d388a18fb3ed1146fcf27a3

    SHA1

    dbc2df85dfaf24c0863ffe7e6c1c4728dfab7641

    SHA256

    7d38139299b9118e4a48ccdd12ce869d1563961187ae21c8e55804dbf3fc6a32

    SHA512

    71a224794bc24a3aab035b50635ab90d36789822cca382e598908f14d186e98ea8c65266ecedaa8d6fd36730e2851838d0f9747c809b2fcae0b0d79bfd5d069d

  • /data/data/com.fsaslkasata.kuri/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    2ca1113107fa8af0453cdddbe9a3551b

    SHA1

    060f984b45eba72c3283cf7299e6e42a086d9bfe

    SHA256

    57a18fef4d421927e1965a286fa6e39e8ed1ea748c3e0554494acbf676ab2e04

    SHA512

    869e0d135253cdf51d95395fd782efc8ce6f04dd28c82f0cba950d1bf47c78bd3cfbb8a4a124c82337e16f5e95761e938b9e71e5d724bbec2b3a0a6fc4541c36

  • /data/user/0/com.fsaslkasata.kuri/app_sheriff/qmjpQI.json

    Filesize

    1.7MB

    MD5

    1a767207b9f279b066ee528e6fbb55e0

    SHA1

    83737766ec897e392d349f5214908d501f506a94

    SHA256

    73df73b48a9a51618d9628529b88b41a44a1c213804df7fc1c80b56e740ae0fc

    SHA512

    6a69ac352648ec3e990185d5e74dd3aa0116e9e18ca6523a973af72bb88c69fc8b12d65d2344832b9185cf4aca12ad58a5c6bfd57ffcbf0c98c8f555fa733a5e

  • /data/user/0/com.fsaslkasata.kuri/app_sheriff/qmjpQI.json

    Filesize

    1.7MB

    MD5

    9eccb01fd5e6aa747a3b8fcb38173340

    SHA1

    77a21894421bbbe4ae767c9b56150c22a380f86a

    SHA256

    3163ad11d263490feeabaf6d1e83a9cd4f5466a031cc012c02bee0212edd09e3

    SHA512

    740be2e7273890531c52d94be49ec71ec7045fd38cfcfd6330951125996266832ed2ac13369d18931e8659b251149f3793a3e1f8c66a8b457063b2083c1788e2