Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    16-01-2025 06:18

General

  • Target

    b39066b6ef956b773733e3441485e2e3a6b412251a33113bf7f29de7f010d3c9.apk

  • Size

    3.9MB

  • MD5

    bd281af4799e607361972e7db41aeb84

  • SHA1

    0fbfd66b84bef8c44f8cc1eb222ce39b40f5e9aa

  • SHA256

    b39066b6ef956b773733e3441485e2e3a6b412251a33113bf7f29de7f010d3c9

  • SHA512

    86f1fe505b00fdb2c8a14addbb98159eb5c980d7a81036c7d017573465eab5a425da25718d4403d0118ad726640021e947044eb5f99155a0b1dad1b3a95da887

  • SSDEEP

    98304:9L2WOfKPr7DNEj05LKba0ySreQY6V4FlX8ExdXRElQaqv:oWOoDNEjoLgCQb4oExlREcv

Malware Config

Extracted

Family

ermac

C2

http://154.216.18.137

AES_key

Extracted

Family

hook

C2

http://154.216.18.137

AES_key

Signatures

  • Ermac

    An Android banking trojan first seen in July 2021.

  • Ermac family
  • Ermac2 payload 1 IoCs
  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 22 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.zkasaslkasata.kuri
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4615

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.zkasaslkasata.kuri/app_exercise/UNq.json

    Filesize

    736KB

    MD5

    5d672c08aad79b225d9e420bf4089408

    SHA1

    8c9d7e9e94c8866dd2df48123ed223c59f615188

    SHA256

    af8d3366a547d8fdabd01b98da0c947b8477aa81f85e3c1672303a3f5064b29e

    SHA512

    c31d09e892ae0a1bf3d1bd903648f773607fe163b8ee386c11e4b5516c68db747f4d7ad91bba17443b446589c4b70db62e1079afca5badbc3f63968dcd8d6c4b

  • /data/data/com.zkasaslkasata.kuri/app_exercise/UNq.json

    Filesize

    736KB

    MD5

    9aa5cea33b9868b1a19149a4f89be59d

    SHA1

    32b040b6f045c127da1ae04dc33737914cb6e01f

    SHA256

    e1df0b98068001a3532efca304f30e272c9f4661bc62e5ec952b1399ddbd639b

    SHA512

    d81e4943c13ff2bb484b297ac35e2fd20b6fbfd8d49c649c6ffea8574316abf626316a18793e196f2c785bbdd4fd01f11fab828caeae0611247bcbb39d75dc96

  • /data/data/com.zkasaslkasata.kuri/app_exercise/oat/UNq.json.cur.prof

    Filesize

    3KB

    MD5

    f079aacefe2dc78bf689b1c0f1e8a80a

    SHA1

    00ad3743490f28276dfed09fc7613904c109a8c7

    SHA256

    b85705183ce4d8bc0309a7e1d4ef51c53f479dcde3f035438a1b69e0056567cc

    SHA512

    08ef0f73b794fe291a79c0ad89750559807c3f619ab7acecaf3e40a88e868c2a1eff09cf06bb0ccf65dcf99fa2e94a80bf43009f92bce22da768ed5f59b5dffb

  • /data/data/com.zkasaslkasata.kuri/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.zkasaslkasata.kuri/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    9aa67d56151a511d4a206041d5104381

    SHA1

    5c4de3a848d6f34efb00490ffc686cca8240ede3

    SHA256

    a99c97dc8b93d33b1e0c1a7f9f7d6a3754f62c15d349cf7a0b7766eb23edf2b4

    SHA512

    0fd37cd7bd129ae8997c4d594d1393773ac5ac76941a3534006d1479d6b6d89748a89ac923ec49776693eb469b2735344afbe4d20b9c9a3e29c4e121d17a7cda

  • /data/data/com.zkasaslkasata.kuri/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.zkasaslkasata.kuri/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    e733eae02c20b8697b225f5ec65bd013

    SHA1

    52140978efe664359067c442f341b3ccf5a33772

    SHA256

    fc3ccd5d4a8e27d5f80c8a029ff59428dd6730b484662f253be53c85ac30b772

    SHA512

    86cb8b629fce3d4d753cc4f06ac36c74d9dc7ff9e7d5ff5da9cd655a85436ad65db1178f4f2101c0c6077a3c7a656ea7bdf9ed503efd689d56242570d2764a98

  • /data/data/com.zkasaslkasata.kuri/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    3a68601516820eae250c0e014023faa1

    SHA1

    9aaf4dd49900f844270cb7725ff0a2f8ccd4bdbb

    SHA256

    56fdccf2d5895f7097ad184365287ab3dcbf5d8eaebf80ed1886402feac1c037

    SHA512

    65630642844c1d7c295541698b0191612a3ef569ae03798e6f4a1c0f29b71e2a8567457112165137f85091d141453c17ccf7cc088372bb9f105f1b0d0d2d4e26

  • /data/data/com.zkasaslkasata.kuri/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    33a68c013c6974a521f6023032ec8f3f

    SHA1

    31289e503f2d13e3bc07679591f4eb72a76d0083

    SHA256

    2a0cf3c36306c0d8eada18c33d31d14c77abf1bc39c46a548a04a0319a52f4cf

    SHA512

    87a99f01a0136c7efe9f5a7ca465ba9092cec217d8f1f15a3762e62119198bb7b68b0b49ebc36f4b38923d53f98375f917d07635307f1b2195c68e634f52977e

  • /data/user/0/com.zkasaslkasata.kuri/app_exercise/UNq.json

    Filesize

    1.7MB

    MD5

    40a20d8c23e21773552ed5f59ecb321f

    SHA1

    4823c1f50540d987bd530b729f908fbefce04def

    SHA256

    b5c5ef231d9a03d37e7c9b99e2796734f072cc085b117f4e424c9583db02dc01

    SHA512

    5e4634b040c5989763fce4f9e8776d19687f0dd2a169cbbc13ef4ae4563aba1a1fcb19b22486814bf3d220eb87db7c5437433a2fd3310b5378d804b4fe5f3570