General

  • Target

    0e1414ab3e8cfb6c3f084066ed4facb20c1848dc16c3a1256ebc8b32aec7f39b.bin

  • Size

    1022KB

  • Sample

    250221-1wz1ya1rgk

  • MD5

    f97568259690c5774cbdf840c7a6d76d

  • SHA1

    00dc0bcbbe7a62b0001d2eb72e1dce8d38c1e544

  • SHA256

    0e1414ab3e8cfb6c3f084066ed4facb20c1848dc16c3a1256ebc8b32aec7f39b

  • SHA512

    59b807a8d7eaed636c504ee43cad3a5d66f115d09395820ae84b7c0ab1f6a5fcd905c00ae2d40af5a3b683c413d8a537b827c3c2cf164405a5b21e76c74110c3

  • SSDEEP

    12288:CoMbyZK5G+biuvip5RBlguC5gApVD5U+rUA5LgA4R4P4E4f4j444p454n4WiIw:CoRI5eRBlO5gSDU+rUACACYnkUfq+IS

Malware Config

Extracted

Family

ermac

C2

http://20.199.76.181

AES_key
1
736f73695f736f7369736f6e5f5f5f5f
AES_key
1
3141317a5031655035514765666932444d505466544c35534c6d763744697666

Targets

    • Target

      0e1414ab3e8cfb6c3f084066ed4facb20c1848dc16c3a1256ebc8b32aec7f39b.bin

    • Size

      1022KB

    • MD5

      f97568259690c5774cbdf840c7a6d76d

    • SHA1

      00dc0bcbbe7a62b0001d2eb72e1dce8d38c1e544

    • SHA256

      0e1414ab3e8cfb6c3f084066ed4facb20c1848dc16c3a1256ebc8b32aec7f39b

    • SHA512

      59b807a8d7eaed636c504ee43cad3a5d66f115d09395820ae84b7c0ab1f6a5fcd905c00ae2d40af5a3b683c413d8a537b827c3c2cf164405a5b21e76c74110c3

    • SSDEEP

      12288:CoMbyZK5G+biuvip5RBlguC5gApVD5U+rUA5LgA4R4P4E4f4j444p454n4WiIw:CoRI5eRBlO5gSDU+rUACACYnkUfq+IS

    • Ermac

      An Android banking trojan first seen in July 2021.

    • Ermac family

    • Removes its main activity from the application launcher

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.