Resubmissions

24-01-2025 04:42

250124-fbrhvazpdt 10

23-01-2025 22:07

250123-11yzfaxman 10

Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    23-01-2025 22:07

General

  • Target

    e8f7e0ddf7b5cd98d6082ea637ed6f09ded5579416943569ba539482ee3674ef.apk

  • Size

    2.9MB

  • MD5

    02275f5145ed19ba4ba82ca87165d96f

  • SHA1

    a1c8117b976038e054c5e8ffb9c35ec739fd056f

  • SHA256

    e8f7e0ddf7b5cd98d6082ea637ed6f09ded5579416943569ba539482ee3674ef

  • SHA512

    d490f814820da3bb6f867e29e67423eeae731d5a985fe5d8a8ad12bbfb3bb25b068dd012b9634249d8c739afdc07d6ecef14ac8973f63dde200c8d2d497c0710

  • SSDEEP

    49152:cN8rUF2r76f4+AqHmlGT+BhYVAqaf8OpY7vpag/ctl4Y+Yk7zXX7WsdT0+XQK8xO:cNUVrM4DlG+LfDgpagE76Yk7rzdPmbyD

Malware Config

Extracted

Family

ermac

C2

http://85.209.176.200

AES_key

Extracted

Family

hook

C2

http://85.209.176.200

AES_key

Signatures

  • Ermac

    An Android banking trojan first seen in July 2021.

  • Ermac family
  • Ermac2 payload 1 IoCs
  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.ziduzalizile.babe
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4281

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.ziduzalizile.babe/app_DynamicOptDex/Mq.json

    Filesize

    688KB

    MD5

    33f81399d9cb0b34d2dc0b214ff56684

    SHA1

    f250fd4185284aa966611017f714c20d444f5c94

    SHA256

    1e3eb8420f07c409b06a40b961b0281210a879cbc7b400f7950cc622a6243bcd

    SHA512

    885afb8fed2e13acd97cfcfc23671cc49a67fa98a1594237ad54bc87a958a780cffb37502b4917820bdcb02bcbb68a572affb96d2cf48f9ed6e880f5e2035680

  • /data/data/com.ziduzalizile.babe/app_DynamicOptDex/Mq.json

    Filesize

    688KB

    MD5

    4a377ab34ebb266e4136f4446db61563

    SHA1

    7cf0b81f020f6e9f4534613c026f12d519390a6d

    SHA256

    a791c226d483b142a1bb5b24b29dea476ec34e7f1029b6f6f9a71858579f7edf

    SHA512

    adc606df6c9b3e8e4573b2d67c7770b6d626de1eab67060eda3984d7760ca216e4c464d348a3b47238ae483fdb368c8328a5f34a1b06703829eabf8d4d4ee2e2

  • /data/data/com.ziduzalizile.babe/app_DynamicOptDex/oat/Mq.json.cur.prof

    Filesize

    3KB

    MD5

    6df207f1f4edcb163d4df4729e0e7f4b

    SHA1

    24fd78b3b45e0971a4fed86722ddc4d2f0d85d51

    SHA256

    117610a049aaa63add0cd0f974fc4c78af508c05acb226ee5af6bdf6bfef2fc9

    SHA512

    8953f3667e7c7027cfcdf133905a693b2a2c496fc38ddadfecdfaefb20fd2bb52ce5c9123f5cdfe6cec014c673336ab3117d2edc010eec40808b7309aa7307d5

  • /data/data/com.ziduzalizile.babe/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.ziduzalizile.babe/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    b7a4e81ab1d16c1f736583e5e0f378ee

    SHA1

    99a18144f29c26931f77ced7cf3cb496d3990c5f

    SHA256

    145ed39af6f0e3b3626722b434937ce078ef1e2c4aee2047b793c5757752bf6e

    SHA512

    7c3020d97c985055165e219b56d390de0eb5ff6d35b37ebfb2dce950c60b037fd68e260cedc6e29635f73fa108d1427841ab803af2a42ec989aca952fcefd520

  • /data/data/com.ziduzalizile.babe/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.ziduzalizile.babe/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    d28d29fde992e4b990d3a2233a4e7f85

    SHA1

    f7a26d83a0454af6ad5c652c2f49dc06d152a59d

    SHA256

    e10894e9a8d485690cb696ccfa06c31cf9c3edfa97a444887f9febec1d328b20

    SHA512

    ced9777d2f4f5d6d0ed0ae3b9b6ce3294ff07125972c2b37d2fb2485889a9b760f5bf8b904c4c24d698342788eb7abffd1d513efa353c1c808502644ed871f3e

  • /data/data/com.ziduzalizile.babe/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    85c5003bc296b6f3620720f9c0939c8b

    SHA1

    581e5bfb1e48eba719c7bfccb6bf14459d1946ad

    SHA256

    f40b00d49d2651cbbadc4bea335c761e2686b5f35bcbd6186cd0d9c56642dc76

    SHA512

    e9957f1a2bfffb2f16a46dfeafa9c955a4ae51c3bd0be84a7f1e9bedf5268d75197a71c28a4a095a2bb83d4952f2d7aa8966fb0ae9f13b15bd9816abbbd02063

  • /data/data/com.ziduzalizile.babe/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    77b815e2eac0d0ae7eb6b1277fc295f0

    SHA1

    397447c7a5779280d556251d897743969510afe1

    SHA256

    d32be5420857415acc30c636f7989809b90e2290948956bc1a5a7c630b09c691

    SHA512

    91ccdcb5033c8498f2fb23c480fb71d4ca742777b3f8bd6bba6150defa9450f128986f76e52974a252f67eb58dfee3459cbf28dff915fa1eff366ff5e3f8044f

  • /data/user/0/com.ziduzalizile.babe/app_DynamicOptDex/Mq.json

    Filesize

    1.5MB

    MD5

    ad81c73514b03d3005856b972793755d

    SHA1

    879f67a8f437a3354cdb7e0cca432cffb8be240f

    SHA256

    cc6105c5c2f91841597d5b9ff10b0a078e843e310a3ce8cd7f91d754271793ce

    SHA512

    9ad03ba61b52cc81c2b8cdde78ee20cd4eeda5188aa3836964ebb6312f976b915c477a0e6ef296461e1832124cd2593914805502a5f298fe44b52c6f1209f410