General

  • Target

    7c5c51531b51556483c5b9b1fc65160fdf71528826a3d5dd1cdf7db33301a35f.bin

  • Size

    1020KB

  • Sample

    250210-13rcdazrfk

  • MD5

    4c9e95d3b84e64466f7f4a0d013d19ee

  • SHA1

    37cc4b795424f34e0d250a1e1c39beb2bf551c2b

  • SHA256

    7c5c51531b51556483c5b9b1fc65160fdf71528826a3d5dd1cdf7db33301a35f

  • SHA512

    794f12befd4fcdf3cda0b7e521f951e00a1572d65afa7d7f5e4cf7e9c18cf0e9c1e6d1eb917102e3e748b2c237e6156052ecda60bc6457daa175bb7a77faf23a

  • SSDEEP

    24576:hg/zx5OdpmQeXjE1h+0FrT/KYWx9iojGM9k:hg/6dpcIhbowqHe

Malware Config

Extracted

Family

ermac

C2

http://185.150.189.29

AES_key
AES_key

Targets

    • Target

      7c5c51531b51556483c5b9b1fc65160fdf71528826a3d5dd1cdf7db33301a35f.bin

    • Size

      1020KB

    • MD5

      4c9e95d3b84e64466f7f4a0d013d19ee

    • SHA1

      37cc4b795424f34e0d250a1e1c39beb2bf551c2b

    • SHA256

      7c5c51531b51556483c5b9b1fc65160fdf71528826a3d5dd1cdf7db33301a35f

    • SHA512

      794f12befd4fcdf3cda0b7e521f951e00a1572d65afa7d7f5e4cf7e9c18cf0e9c1e6d1eb917102e3e748b2c237e6156052ecda60bc6457daa175bb7a77faf23a

    • SSDEEP

      24576:hg/zx5OdpmQeXjE1h+0FrT/KYWx9iojGM9k:hg/6dpcIhbowqHe

    • Ermac

      An Android banking trojan first seen in July 2021.

    • Ermac family

    • Removes its main activity from the application launcher

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks