Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
01/03/2025, 22:06
Static task
static1
Behavioral task
behavioral1
Sample
020a1731f996a6440e29344be68c25cc2238cc6fefbf1c63c1084d6300bb73d0.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
020a1731f996a6440e29344be68c25cc2238cc6fefbf1c63c1084d6300bb73d0.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
020a1731f996a6440e29344be68c25cc2238cc6fefbf1c63c1084d6300bb73d0.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
020a1731f996a6440e29344be68c25cc2238cc6fefbf1c63c1084d6300bb73d0.apk
-
Size
3.0MB
-
MD5
a806c91bc15c6fa250f71b8b45528e1d
-
SHA1
f9e590ef456303f3ed9aafc3966a20e83a919384
-
SHA256
020a1731f996a6440e29344be68c25cc2238cc6fefbf1c63c1084d6300bb73d0
-
SHA512
a2065f004e619319a8d180eace8bd5efb4fc75e40f3c2863d2b57bdcfb44c1431611b5a9f98e7c2749590bb58c96420c04594247284fbdf29f6d27f816ac448a
-
SSDEEP
49152:XHkuzDKGRYY5pqHp+gsdT0+XC7mCjS0XJQ6TGz+bhYVAqaf8OpY7x+3bPK8lg/PY:XHkHYXdPCFXJFaCbLfDx3ZgH/YyB4CV0
Malware Config
Extracted
ermac
http://176.123.168.62
Extracted
hook
http://176.123.168.62
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac family
-
Ermac2 payload 1 IoCs
resource yara_rule behavioral3/memory/4746-0.dex family_ermac2 -
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.tencent.mm/app_DynamicOptDex/di.json 4746 com.tencent.mm -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.tencent.mm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tencent.mm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.tencent.mm -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.tencent.mm -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.tencent.mm -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.tencent.mm -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.tencent.mm -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.tencent.mm -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.tencent.mm -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.tencent.mm -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.tencent.mm -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.tencent.mm
Processes
-
com.tencent.mm1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries information about the current Wi-Fi connection
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4746
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
701KB
MD5dd507df4888dbaad6c64d5b77b0beb7f
SHA1dda6f5c082058beb9a60c70858af009a0f71a2d2
SHA25660cd9fb5dfe86c5328e82d32a4a826a2c00400735ed9adeb15a34c1ace1e5f63
SHA512d49c12ac5b789dbc684ea18c3afb73d9f583631c73f3497232cccf53040f04396b1ab33941901bce4d0eebefdb42fb750da5a7a7640d32c05a38ac039621d1d7
-
Filesize
701KB
MD5badc9eb139d9474cded9a53bbb8cac9d
SHA15a25dcc8b957c77f65932de8f0cfd056b6d1cff0
SHA2561723cfc3c10e81e8d9d67a2eae25705c5896afdf3fb0b47210fc094030c6ab97
SHA5125c26e3564822654e6623a788b3680f141b4334268836251de284503ebbf50eef4ab54d2fde0e44b72f6e9776c91350d143f62fab9c7eb79b78cbf12be60f7c62
-
Filesize
1.5MB
MD57f60b07ed6592877ff7d6a081eebe253
SHA12005ba9cbb222e2d5fef82f91223d32c5bb1a71e
SHA256841459c86ceed636626616bc027ead9721cdb9c015492802a925a2b0edf0a7c1
SHA512d180fb35c7550d0952f9c6952093024b016d1dce47dc814414181f5f36ae020f7456fafbd46d101934bd2392e57e102435c6a3ad02ca5c29f301580a05712e4a
-
Filesize
3KB
MD5c8604207bcddec4e766f90767f983ccb
SHA1981f9d30bef7ab2a77182d1dee6d87787224c2a9
SHA2564e5ad7dfbaa345eabb087c90b76e30f74f5e5c4f28fafbc7f175c7de3bde36d6
SHA5123a716019a4767596a2615581babe69e659e4da08abd80b68cd1f0ad1b05325f69bfda579a217479d0dc1ee968d061871fa1e05a8fc2cef686d64d40a149aa339
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD50209ea4b42ec876972c3a2dc281dc8a3
SHA1bd42943b33ba73efd4af8e13c35a246cae829861
SHA2569e06526de6f23ae9ca4d7089392f7cecf8c52294b15af1678db4e5179e4602fa
SHA5127d9393ef608f54f629c280ef3a17f44ef8ca04dd22bbbbc393b53ca764781cda0f3804f754be86e87ba978df2dcf8d2b51815c013075398148f188d66dbffef6
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD57b4376a48eccda116965c4ee3f99b3a9
SHA1e18c8f30e189c7637348aa16cc3bcc13def41ead
SHA256154a0b482d830081fec9fb26609a93aef37e0690b82a118e8909a14433441e9b
SHA512ea18d8bf94355c0330d52de931e6d049344825557ed619a47af75ed50b6f17a5b8cf8c3d46eb6d5c4f324f1b159cb2a4ef5252b9cb38e51021dbc6c595d318ed
-
Filesize
108KB
MD5cc3f9cc682e0b58a53797a9de1989db8
SHA10d0578bcc18003920a35629e2dd652b38ed48127
SHA256c1ab68afaeea43dcdcd5da91fcedc721f89a01a14d4247555e14e534eac3dd5d
SHA5124569c83478c322f367991fd7c95100d636d206632c41730b41fec436647b575e40cc57fb6ab0a0861aa2e0b8214066f5de8715b41aed6f74cd882a5deeb7c837
-
Filesize
173KB
MD5aacd8b59d3aca1d153a5aa26275c31c0
SHA182d0fcdebc12d049aba6d15762bd1b4e0862d275
SHA25650d8256d113438fc53ab78919e6d1a18bbcf8eff39e9af9968869e2c4401068d
SHA512b2fdddd535108cf817b31db3de8d59aca152c32b6b18f164a1f73d7ee1805b7e96290b467e2079bb528de78a49c6e1161cbd0856adaf442e16a024879221f013