Analysis
-
max time kernel
148s -
max time network
152s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
14-01-2025 22:02
Static task
static1
Behavioral task
behavioral1
Sample
913c3f5a4ac477a4d3b22828cb7b34c19bb483d76c9e34fea2c2c2a839bc6d6f.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
913c3f5a4ac477a4d3b22828cb7b34c19bb483d76c9e34fea2c2c2a839bc6d6f.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
913c3f5a4ac477a4d3b22828cb7b34c19bb483d76c9e34fea2c2c2a839bc6d6f.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
913c3f5a4ac477a4d3b22828cb7b34c19bb483d76c9e34fea2c2c2a839bc6d6f.apk
-
Size
3.1MB
-
MD5
567b35b4761c2ba1d892138c301b1101
-
SHA1
64b8e8d590402ba162fa2e8c446ec30de33d6caa
-
SHA256
913c3f5a4ac477a4d3b22828cb7b34c19bb483d76c9e34fea2c2c2a839bc6d6f
-
SHA512
0a42739323f2daf57ddc6aaad9aac292573505477f64ce3c89fe60ccab3eca36e4efec3a3f339cc27fb47537cbdb91af9b384fbe1842d0dd2ad30432c37cdb7f
-
SSDEEP
98304:B05FVxjEHmnwGDKxlMMW7JUkk6dH8FMkw+/IzkCpht:BmxQGFDe+7Wtan+/Ixt
Malware Config
Extracted
ermac
http://154.216.17.69
Extracted
hook
http://154.216.17.69
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac family
-
Ermac2 payload 2 IoCs
resource yara_rule behavioral1/memory/4238-0.dex family_ermac2 behavioral1/memory/4213-0.dex family_ermac2 -
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.fsaslkasata.kuri/app_shed/LB.json 4238 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.fsaslkasata.kuri/app_shed/LB.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.fsaslkasata.kuri/app_shed/oat/x86/LB.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.fsaslkasata.kuri/app_shed/LB.json 4213 com.fsaslkasata.kuri -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.fsaslkasata.kuri Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.fsaslkasata.kuri Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.fsaslkasata.kuri -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.fsaslkasata.kuri -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.fsaslkasata.kuri -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.fsaslkasata.kuri -
Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fsaslkasata.kuri android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fsaslkasata.kuri android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fsaslkasata.kuri android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fsaslkasata.kuri android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fsaslkasata.kuri android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fsaslkasata.kuri android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fsaslkasata.kuri android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fsaslkasata.kuri -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.fsaslkasata.kuri -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.fsaslkasata.kuri -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.fsaslkasata.kuri -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.fsaslkasata.kuri -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.fsaslkasata.kuri -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.fsaslkasata.kuri -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.fsaslkasata.kuri -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.fsaslkasata.kuri
Processes
-
com.fsaslkasata.kuri1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4213 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.fsaslkasata.kuri/app_shed/LB.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.fsaslkasata.kuri/app_shed/oat/x86/LB.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4238
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
735KB
MD519dd9a04c41a4a5079fc0fd01a463cd9
SHA15bf4efd520550528535a60cb96f997777f89f172
SHA256b95d00de087834af97723dcad42cd3e28185ce239e9ae422ed96c48c947015c5
SHA5122cd3187a11af71bc660df9d51e63640dd5353d3b0936f226f4106e21f382e1799843f4ed6c8d87ce3b5fe72c190795476ff6d57be4e538e703bbfadd0e4de8c5
-
Filesize
735KB
MD53d57a3bc0cc3f3bcea3bbabac2bf423d
SHA16e703b10c76e1cc8b2e85583383a00e42f56d4b4
SHA2569cf0c3fe66a49d668c75a95b022592cd6815236f82d944cb9a472e0eeab36ca5
SHA512e428afe928a93f2af1dbe82e88eef462e7beca5f0e268bb728c6da65273acdea37b1e65bc21b67e22a7a5d0ef74f7db06cd9c5daef8e298c98825171ebb1d892
-
Filesize
3KB
MD5ce5a83e3c83296e69be75ff66b16e64c
SHA1b0e573ea6f56fa76aa2065f606ddef7fe5fab76e
SHA2564dcda588797c282a2b73618ed510c5c11a1eb16847285ce692544d88e3981de4
SHA512a1eb4f71904b24239581abc8ff20a9c690264bf7a4f1afba6cfa174df523449967c12720b40ed9cee45a6b7a754af138835d8934cd80e92cdd52ecd629ca32de
-
Filesize
3KB
MD5413bca894c5407c50e4dfb6cb3d10bfc
SHA1b067176ffad6c759d8150e8d5a083de4d9740e1f
SHA256c7296c1054bcde4bc96fe80ed07907b7314d7cc9ba76439f8cc007ffd924b0b8
SHA51234049a39e2523f25f44eab532cf02cb511cd2546419b58970cfdccf031b47dfe212a316d9b46f9ab91fedefaa22733b5d64ba9a4ad0a31deb317b9455a485aa7
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5c0ed4135835c19bd025b84b22b0f2b96
SHA1c98fbebd00a3d047a34356bec08fb374e3b0cd01
SHA2561d059299b71ee3c635c5a4c5cfc858743880651d817f38a00e5ea72355b671ea
SHA5126c967219d31c5b6235d87fed10774031b914c05c5320d9511db7e1dcd87c4fac09521ab4286f2794a3d04feafc63b6c4d28ab42c75e1005b9fdefec02db86394
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
108KB
MD58fb286ca3a8686847efb2443c2686120
SHA1bc67cc22c93a2c55d4dbab5d070024a7982bcc4e
SHA256ad5e203665b66ffc3b23e64311f4fe5ac50ba2b69f306b0ad62bb3ec3333f828
SHA512764dba8686d39a34e5f6f32d85f5c4282ce4ee7dfc91cb2d05489f604ebb05c93da38be5dc49c2a013741384b2e4f936c80a617f7ad0f039f47e34031a3a5a09
-
Filesize
173KB
MD5ae7ddd1f93fe8dd861a68fc7a89fa6f2
SHA1e1c30025fcaa08b3e7d9216e7e37a0023cc18ee6
SHA256e73ae2fd698b619210e2cbf0545ecf596723f920e226291860c8d00fa7aeb849
SHA51262574213ac671b0311cdf934af2bac85cd2bd1e71d1ddf4d6547b46aaf11150002c8b6a984edfcbd571ca634f3951362e06c7d0d7f180d82ecd78dbbe4adee9b
-
Filesize
16KB
MD5403710205db2f665873a93680b0aef98
SHA14ef1a10a53318b68549ba77955f9e1bfbd22cf57
SHA2561841d184a097fec6fc4b9c1d916579568666c7e67597ff808fdaf7d136f184f4
SHA51255fb82b44eb1eb919af62cb6bb514b539b4c7004b029c4c3e29f8ccb68c646cad318b43c8b28c8465d4615d0401a23cfaa290503772ad694e018f3d5d26ba713
-
Filesize
1.7MB
MD51a767207b9f279b066ee528e6fbb55e0
SHA183737766ec897e392d349f5214908d501f506a94
SHA25673df73b48a9a51618d9628529b88b41a44a1c213804df7fc1c80b56e740ae0fc
SHA5126a69ac352648ec3e990185d5e74dd3aa0116e9e18ca6523a973af72bb88c69fc8b12d65d2344832b9185cf4aca12ad58a5c6bfd57ffcbf0c98c8f555fa733a5e
-
Filesize
1.7MB
MD59eccb01fd5e6aa747a3b8fcb38173340
SHA177a21894421bbbe4ae767c9b56150c22a380f86a
SHA2563163ad11d263490feeabaf6d1e83a9cd4f5466a031cc012c02bee0212edd09e3
SHA512740be2e7273890531c52d94be49ec71ec7045fd38cfcfd6330951125996266832ed2ac13369d18931e8659b251149f3793a3e1f8c66a8b457063b2083c1788e2