Analysis
-
max time kernel
149s -
max time network
152s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
25-01-2025 22:11
Static task
static1
Behavioral task
behavioral1
Sample
3232a0480eee258c3a3ac761b91b6183c7411f2ddd8bc056b1fc535788048cd5.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
3232a0480eee258c3a3ac761b91b6183c7411f2ddd8bc056b1fc535788048cd5.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
3232a0480eee258c3a3ac761b91b6183c7411f2ddd8bc056b1fc535788048cd5.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
3232a0480eee258c3a3ac761b91b6183c7411f2ddd8bc056b1fc535788048cd5.apk
-
Size
3.2MB
-
MD5
d69e6d0fa481ea70f6e8204a269ea61d
-
SHA1
621bbab5eaf32a0af87e503dc97d2b023c71f350
-
SHA256
3232a0480eee258c3a3ac761b91b6183c7411f2ddd8bc056b1fc535788048cd5
-
SHA512
281c35474b2620101715d28629b79d048c257ff64575b7435c4adfdc15308231890a2826cf4d7c0c2cf891e9b54c79c964f14c3e45d073b2251791cb868f335b
-
SSDEEP
98304:AqUJikGdB8LYOzUD8Hp/tYd8HD8CsTeAWigOm:AqUkkCAYOw4DY2HD8nTyn1
Malware Config
Extracted
ermac
http://hwng8dpx.pro
http://b7aae7vc.live
http://u4q9mbyk.pro
http://hcivp9p1.live
http://rzndg5cg.pro
Extracted
hook
http://hwng8dpx.pro
http://b7aae7vc.live
http://u4q9mbyk.pro
http://hcivp9p1.live
http://rzndg5cg.pro
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac family
-
Ermac2 payload 1 IoCs
resource yara_rule behavioral2/memory/5100-0.dex family_ermac2 -
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.popevacedosukepu.boyeyu/app_annual/alyqcc.json 5100 com.popevacedosukepu.boyeyu -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.popevacedosukepu.boyeyu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.popevacedosukepu.boyeyu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.popevacedosukepu.boyeyu -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.popevacedosukepu.boyeyu -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.popevacedosukepu.boyeyu -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.popevacedosukepu.boyeyu -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.popevacedosukepu.boyeyu -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.popevacedosukepu.boyeyu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.popevacedosukepu.boyeyu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.popevacedosukepu.boyeyu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.popevacedosukepu.boyeyu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.popevacedosukepu.boyeyu -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.popevacedosukepu.boyeyu -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.popevacedosukepu.boyeyu -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.popevacedosukepu.boyeyu -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.popevacedosukepu.boyeyu -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.popevacedosukepu.boyeyu -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.popevacedosukepu.boyeyu -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.popevacedosukepu.boyeyu
Processes
-
com.popevacedosukepu.boyeyu1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:5100
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
691KB
MD5a9453a267e36959521456fcf6fa3fb80
SHA15ac05191c7af90495a83d860c9bfcbfa34885bfe
SHA2565df85a6661649dc827f68b8efaa40f7fe19dc46a5fafa65e356ae3d26bb7df67
SHA512960672b656f25ca821875be76ccd97fbe7d4e5041b4426b2d86f73d39b19080987efb854696ba15b9520edcb430c55377c1a18f531020ede2dc9a0358c0396fa
-
Filesize
691KB
MD5002d858cc3ba8005fb0e39de9a36d7d8
SHA18b3a668468ebc481c5681e410f6f542ba0fe04ce
SHA2562ce810b12620a39e7a22c33b6fbad9d485af8b635c0f9f89919ab5f1035a87f2
SHA51287fd12db2f256d162b426df59699f0d3b40d8638f982d246eeaf3489fc83c4fc849cece3e5b0852bc7d697ff3014c95e715e8aa3afe1d7c760437333c3c4537d
-
Filesize
2KB
MD5285957bc03b434168afc60a4dc8300fb
SHA123a057902c4e0bfdc960ee82291c7b36ebe8ec12
SHA256890d09a0c45751adbd9538215c7fdaebf9e03b2cf6c1599c4227d1b36282381f
SHA512a11ef3ef2a52331bd1368dfcd714d4e8c638301d3ffb7ea1e1a460aade6f81bd498baf27d7493f7fd347f5606fbcc47ab66c335bcd92fc43c2a1f7c3ddcef78b
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5ce8aaeef99b700f0f59ad6d1d17b3e7d
SHA1b726c9a655bfa485fc716103f5a6f288a84a16d7
SHA256794d7778839ebb5b14533314c198893aa2e8c6e2fd12b18bb60e4d2f238bdf4e
SHA5129cab19f0ba6b86a531cd43a4275c52ca38152779c7c4aebf8f3b556a36b0d8cf687982e4041231af17f2b184333f2470b620e001f6cbf260f8ee6ef3d479257c
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5e97834bd2035f7543b805bdbd3ad6239
SHA1eba40de1a0c520325368ff468fdca94d6a8b9e78
SHA25600a290cf13417619273123300111535e002c111365df5d080d73af5fa9ad4643
SHA5126f4fe91a1f3c2d120d92251dbda201453fa72a2d58ff021cbe1fb227ca0ed5bb80ff7bac732076dfd89709bdeed9bf7e214bb1e9fb8c3589e1e9d5bfb82d6291
-
Filesize
108KB
MD564e1ba977273418ed53e8510477e8a85
SHA15043964dd0d5c93f6dab788255e0ea71e93ea864
SHA256e3d68dba7ae8ad6f79b5434f51d2554a0c67bde0a94ccf5992c340fe0d2382f6
SHA512fc2867a9c8636b552190c9ea6f73a9caaf93c25bc622150450ce6978d93cb12384df64975fb33904a05e21cf4ae710ed37a3212e5029d1119b6b132ba7a7f73d
-
Filesize
173KB
MD5d0a2a8febdeae17c79590b694bd1e319
SHA1e66712fc208b9610e348ffa90163019cc981a2b7
SHA256782e2ea3ddb5a2217ed9fba729b2dc44c96dc7fab50cbffce51a44fd101e7a3c
SHA512d3264ac12536563e2dd649cf2ca82d7860a8dbf62de6e328b4190c7b3b02e2c38eafa0e6cfc313fb7f5e9ba725168424662aef6c1f82f0289d6bfa2d0e6d3da3
-
Filesize
1.5MB
MD57e74547378d97764fcb2b5d2c4db53dd
SHA1eb3958c5f7253db76b8fc727e28da4a4ccff1a86
SHA2562ac5f86400a1c61f0da8a11b97e3bc3663e918354b15a3fe242d2e4931c501b3
SHA512e6f17125a38aa1873d7caf6afa35e96e25b358d3eea7ce65fb3edc33eba0561feb9a520dbc1619001509c6244700ab1901e3113ccc33412ca77481c40933b65a