Analysis
-
max time kernel
50s -
max time network
150s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
28-01-2025 22:04
Static task
static1
Behavioral task
behavioral1
Sample
8f0eb9598f62d7fe2cfc3cba903b8eaa12c8b5c038fdbe44cb1eb6d534b8eefb.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
8f0eb9598f62d7fe2cfc3cba903b8eaa12c8b5c038fdbe44cb1eb6d534b8eefb.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
8f0eb9598f62d7fe2cfc3cba903b8eaa12c8b5c038fdbe44cb1eb6d534b8eefb.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
8f0eb9598f62d7fe2cfc3cba903b8eaa12c8b5c038fdbe44cb1eb6d534b8eefb.apk
-
Size
2.8MB
-
MD5
6c2ab9818107c6ab88435a6c65e3d7b4
-
SHA1
4e4666d21321cbdfd09f569579f05f7634b85a5c
-
SHA256
8f0eb9598f62d7fe2cfc3cba903b8eaa12c8b5c038fdbe44cb1eb6d534b8eefb
-
SHA512
4bd283bb0ea80908ebfc67e872a868b178a1c897fd27944722a27359cabe1e86c9e356545ad5ff90a504c5acac9572cde92f9d30e4975605c2ada27bef6be753
-
SSDEEP
49152:lmHqSDEL7ZidXXJ2pg8JM+WqP0s8OdhKQkPaCFaSQp4zW:cHqz/ZcXXKMM8qQPaOaSNq
Malware Config
Extracted
ermac
Extracted
hook
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac family
-
Ermac2 payload 2 IoCs
resource yara_rule behavioral1/memory/4247-0.dex family_ermac2 behavioral1/memory/4222-0.dex family_ermac2 -
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.mogukepusotada.buma/app_DynamicOptDex/jxiQy.json 4247 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.mogukepusotada.buma/app_DynamicOptDex/jxiQy.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.mogukepusotada.buma/app_DynamicOptDex/oat/x86/jxiQy.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.mogukepusotada.buma/app_DynamicOptDex/jxiQy.json 4222 com.mogukepusotada.buma -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.mogukepusotada.buma Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.mogukepusotada.buma Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.mogukepusotada.buma -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.mogukepusotada.buma -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.mogukepusotada.buma -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.mogukepusotada.buma -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.mogukepusotada.buma -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.mogukepusotada.buma -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.mogukepusotada.buma -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.mogukepusotada.buma -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.mogukepusotada.buma -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.mogukepusotada.buma -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.mogukepusotada.buma
Processes
-
com.mogukepusotada.buma1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4222 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.mogukepusotada.buma/app_DynamicOptDex/jxiQy.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.mogukepusotada.buma/app_DynamicOptDex/oat/x86/jxiQy.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4247
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
674KB
MD575057f108cb8b063e0f855d4d839430b
SHA181a05ad1885fd06af76f79553e0140c168e67757
SHA256c77153cdc99b7ef7c3f3f0858166e3c11969a22f0070583ef03c9b09ca332841
SHA51232ad37e6de4644a1a4251f89aa25ca535158848705a1621c342b281f2b3c6ee911b75365ba51f18efcd2fe1d4cb61368204aeddf9850abc67dbb0f025fba2cf4
-
Filesize
674KB
MD5d41a795f597c022e5c1e8bf59b1a2981
SHA106eab40647796655b52159d6b117e849c14bb4a8
SHA2565ee847df0a416af0ce18186b2e8b9cd34f1ae82746647db91002615f156c8d89
SHA512517c0bffda9354d6833b50e60168a675e121a31d614827dd2dc675fb81248889020c4e02ae46622549a9094ad2ce3026b0ad89b8add7e1136a7ce1c49ca5faff
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD545b2898ce644bb6dc1a7a559c39eedb0
SHA1295684f1690005902a750dd886725c3f8231b8bd
SHA25650f3772f41a7f950831ce99c686d7db82080afabb6cb1e1c0355e2c8610efb69
SHA512458aa422858f975c3fb604142ad115bcb19b21e2938b9d6d10a9903be8309f29cfff68b274ca721ea43d85bb613fa706a0a865ee4e3f562ad89d4066ebb453d4
-
Filesize
28KB
MD5cf845a781c107ec1346e849c9dd1b7e8
SHA1b44ccc7f7d519352422e59ee8b0bdbac881768a7
SHA25618619b678a5c207a971a0aa931604f48162e307c57ecdec450d5f095fe9f32c7
SHA5124802861ea06dc7fb85229a3c8f04e707a084f1ba516510c6f269821b33c8ee4ebf495258fe5bee4850668a5aac1a45f0edf51580da13b7ee160a29d067c67612
-
Filesize
108KB
MD516179e9094425943a1cf30b511e429eb
SHA1785cb5171985012da6048f971820bf42e7385a2b
SHA2563b95a01703efcb8ee3d91e2e1399a7b44e4761bacb709e2e52ae66fe43bddad8
SHA5124d70e8a64f5ca33e3a26dd6c3df2596871e7f2fed02c6882708660bf2627018f8ee64b0c109c014bf16425e3bc0a54ce18c863b03981fdc8cf6f8148122926b8
-
Filesize
173KB
MD50e00b2226055788968b5bb0d6ec2fc5d
SHA1f0c90437665adf84a9cfead74ee4e9f238266f99
SHA256bc1be53076cbf26f5802566997d784d6e5b986f89d0917e88f087e0e1bfd1964
SHA512c9d2d8eebf5bfa21b7c97a3781e3e8fe8b086ff00edc7c0aa05135b0c7cb288e4a1d86da492407c70137fb4b0e5315390efcc4bfb258d25bf5dbbab55ab81132
-
Filesize
16KB
MD5560ee2c6e3dbc070baa606fe467b0698
SHA1f01ef3f813b7649207a548f20327c7025a605339
SHA25607affa7ad3811bce23b558ff9e20136645805b73499f632062d32f097c7af071
SHA512d34cb8a886a2173376149ac29c2c289f199e8d56bc4291a94d815c01fdb8b19c041356262f9bb2be1367f90b3b68b8305c9efa93c92a056597c1dcccc126178e
-
Filesize
1.5MB
MD5ed608d6e34dcec71e5b3bd6baefd85e7
SHA120ec31a5a751c6fad20a63005f47e795182dec65
SHA25600f87cfb7ca591322dfd746ac63cfbb296f3c58a628d4bdd1d598ed3347dec59
SHA51298ad1aae54e086e8a1b98ec0ecb5291400aad1ae6a6b7edca63dc87482a5265d3e94318aea9c004336f0426eaad2219cacac0bd31dbd14972b99d3045b2af5ca
-
Filesize
1.5MB
MD5d11f7a0dd138c705e1bd458110f1807c
SHA1b4975d819f8607b395032de8cac736a019a73ce8
SHA256591e97ad31cd0b2bd33092b563b4d92fee08d56debcf6bc1df88735c79bc71ed
SHA5123a91ff6f50fcb51baae8d93244bf5dd5ff281e1f9312f5cf353c199a20c41df8fb64078f00e169b3517caadca116c3dfbf3eaa23af3f1ae65c77a676f10ef210