Analysis

  • max time kernel
    149s
  • max time network
    158s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    16-01-2025 04:18

General

  • Target

    913c3f5a4ac477a4d3b22828cb7b34c19bb483d76c9e34fea2c2c2a839bc6d6f.apk

  • Size

    3.1MB

  • MD5

    567b35b4761c2ba1d892138c301b1101

  • SHA1

    64b8e8d590402ba162fa2e8c446ec30de33d6caa

  • SHA256

    913c3f5a4ac477a4d3b22828cb7b34c19bb483d76c9e34fea2c2c2a839bc6d6f

  • SHA512

    0a42739323f2daf57ddc6aaad9aac292573505477f64ce3c89fe60ccab3eca36e4efec3a3f339cc27fb47537cbdb91af9b384fbe1842d0dd2ad30432c37cdb7f

  • SSDEEP

    98304:B05FVxjEHmnwGDKxlMMW7JUkk6dH8FMkw+/IzkCpht:BmxQGFDe+7Wtan+/Ixt

Malware Config

Extracted

Family

ermac

C2

http://154.216.17.69

AES_key

Extracted

Family

hook

C2

http://154.216.17.69

AES_key

Signatures

  • Ermac

    An Android banking trojan first seen in July 2021.

  • Ermac family
  • Ermac2 payload 1 IoCs
  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 22 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.fsaslkasata.kuri
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4455

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.fsaslkasata.kuri/app_shed/LB.json

    Filesize

    735KB

    MD5

    19dd9a04c41a4a5079fc0fd01a463cd9

    SHA1

    5bf4efd520550528535a60cb96f997777f89f172

    SHA256

    b95d00de087834af97723dcad42cd3e28185ce239e9ae422ed96c48c947015c5

    SHA512

    2cd3187a11af71bc660df9d51e63640dd5353d3b0936f226f4106e21f382e1799843f4ed6c8d87ce3b5fe72c190795476ff6d57be4e538e703bbfadd0e4de8c5

  • /data/data/com.fsaslkasata.kuri/app_shed/LB.json

    Filesize

    735KB

    MD5

    3d57a3bc0cc3f3bcea3bbabac2bf423d

    SHA1

    6e703b10c76e1cc8b2e85583383a00e42f56d4b4

    SHA256

    9cf0c3fe66a49d668c75a95b022592cd6815236f82d944cb9a472e0eeab36ca5

    SHA512

    e428afe928a93f2af1dbe82e88eef462e7beca5f0e268bb728c6da65273acdea37b1e65bc21b67e22a7a5d0ef74f7db06cd9c5daef8e298c98825171ebb1d892

  • /data/data/com.fsaslkasata.kuri/app_shed/oat/LB.json.cur.prof

    Filesize

    3KB

    MD5

    835b4f9606de8350564f22bd618339c1

    SHA1

    3f16dc695f1f35f3f6dfbeaf0ac8f117f3f2b226

    SHA256

    cf5d72b65e67574707e3d7c2de762142d4481b7aa9ce7ce4a4d120b2daa56aad

    SHA512

    f3ba2942707e96a4378771e58fd2021b677b9db6697bf80da4172ab4a43404be6362cb5debfe422ee852161a11c38ea04e8f8d3a316b6e2bc29ce001aa5a4e9e

  • /data/data/com.fsaslkasata.kuri/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.fsaslkasata.kuri/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    4e2564af148bdbd14f02f09647ec0768

    SHA1

    eab365d699e366f6c5111c2089058e1abf90a22a

    SHA256

    4550326f86d84da06fb4f3d5c6ab0ed22ceb280879c82ca3e5949f9940426720

    SHA512

    3991339bd164a3056c6b108f842a2ba32eb9382aa4de265934885f61faacd129070efbc87fec14a1a3478a4d988d12a194892793018cfe41827628a0d67de568

  • /data/data/com.fsaslkasata.kuri/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.fsaslkasata.kuri/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    6dcf8d7b72b29d7ee24511d2e1efd799

    SHA1

    34cbe8c3cac6832c6c7e192e821c6e6fb9c6c308

    SHA256

    105f471bdf13a3557061fcd2a45a3750c3aa7442a4cc816b26bae1821ef368c7

    SHA512

    6edbbc6d93f71796ceb05cdf34234df86b1c3637c1fb81fbd31be68614a8b818ed823cbaf0abf1a367c1bdcb65fa78ade3cb17724d3e695babe6ef219fdfefc7

  • /data/data/com.fsaslkasata.kuri/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    44bc0468d4412ee2cd147aa851b962dd

    SHA1

    8a66593758e00293324d679c81a4c2545dc9e1de

    SHA256

    9de60c3d039ee9cdd46f135056c6eeea3d9dcc19759f0b38f3efd5cfab0bc026

    SHA512

    a67f015be90aaa2bc0646947ff4ff7e9fcddbf716dc194386dd4073515bc9bdb4f7b2beba8623b375bb0e22e9396a71f35660221431452d1a0b5ea026f05138d

  • /data/data/com.fsaslkasata.kuri/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    e1b86afee13c8793b62be59e49577406

    SHA1

    bc2b274724533fb482079330f2ee8fa07b20ec36

    SHA256

    afbef49a4573fc979ff4b059b602d16836be7a4d9fc0bd5cd9054dbc9de4af52

    SHA512

    8e158836af8abb1798c29c6990e472dd71045eec950f32d9137b77fe0e6b369d94f8591473006b4a71009fe85f7f8f0bb499e94021215356cceb83c7072cbb77

  • /data/user/0/com.fsaslkasata.kuri/app_shed/LB.json

    Filesize

    1.7MB

    MD5

    9eccb01fd5e6aa747a3b8fcb38173340

    SHA1

    77a21894421bbbe4ae767c9b56150c22a380f86a

    SHA256

    3163ad11d263490feeabaf6d1e83a9cd4f5466a031cc012c02bee0212edd09e3

    SHA512

    740be2e7273890531c52d94be49ec71ec7045fd38cfcfd6330951125996266832ed2ac13369d18931e8659b251149f3793a3e1f8c66a8b457063b2083c1788e2