Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
157s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
06/03/2025, 22:06
Static task
static1
Behavioral task
behavioral1
Sample
4276d1649764516e99b72407e57d45e9cf533c54a1b244c0e31a0cb8282ee1c1.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
4276d1649764516e99b72407e57d45e9cf533c54a1b244c0e31a0cb8282ee1c1.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
4276d1649764516e99b72407e57d45e9cf533c54a1b244c0e31a0cb8282ee1c1.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
4276d1649764516e99b72407e57d45e9cf533c54a1b244c0e31a0cb8282ee1c1.apk
-
Size
2.5MB
-
MD5
cc7de0255e16e361c0f34130239b6a62
-
SHA1
82d69aae36cedbb589138665659777198e2bfaf2
-
SHA256
4276d1649764516e99b72407e57d45e9cf533c54a1b244c0e31a0cb8282ee1c1
-
SHA512
71b5f4a60fe2bffbd45e5fe1399ee91e14d3f3d363c0674595e8d67b527a0a4bfc59d68d1e1f69b5d61659dea801aa773b0a4ed7f46f7726a5ea804ca0d0ca2a
-
SSDEEP
49152:sl6Q5bjxjfdPxZzqVvqH6pUvtcbW2IgsYDRLJB2A2+XW3fJmD:sDBjfdjqVni1cbW2IgsURz2+XufE
Malware Config
Extracted
ermac
http://85.209.176.78
Extracted
hook
http://85.209.176.78
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac family
-
Ermac2 payload 1 IoCs
resource yara_rule behavioral3/memory/4621-0.dex family_ermac2 -
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.varecobexicemaba.heribivu/app_DynamicOptDex/bQGZA.json 4621 com.varecobexicemaba.heribivu -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.varecobexicemaba.heribivu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.varecobexicemaba.heribivu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.varecobexicemaba.heribivu -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.varecobexicemaba.heribivu -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.varecobexicemaba.heribivu -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.varecobexicemaba.heribivu -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.varecobexicemaba.heribivu -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.varecobexicemaba.heribivu -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.varecobexicemaba.heribivu -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.varecobexicemaba.heribivu -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.varecobexicemaba.heribivu -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.varecobexicemaba.heribivu
Processes
-
com.varecobexicemaba.heribivu1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries information about the current Wi-Fi connection
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4621
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
687KB
MD523119440dbc25974466a0e3a7f43aefa
SHA1f5a368299b88214b42eacfe21f31dd52c0a45fb6
SHA256ea432adfa255100a4bbf96cbb2a71a0deaa854c3d376bf7416613f992a228ed8
SHA5123293c293be3a7e5dab5c6a34a806752c29bdc662300ac457d6670bdc3ddd96de2faaf93a27854325943f4233549e9cfe910ac3e42d1d84e17bb5121190b2830f
-
Filesize
687KB
MD576441a57dde838b124cd086312dca3be
SHA1a103126bfdea9ecd0585e32f87f2bb6f249f2059
SHA256915c50fe6ade43e23078a821c5114d1485088b230a8c523e51488cd3fca9da11
SHA512d1796ed87e02dab285d915edcb302e60e415f9a982047fd0c83990841c0cb0bfe1f4bd22aa2fbc2218292a162d76bc916c520acbcf1ba2b63a2a19e3406f6ea8
-
Filesize
1.5MB
MD53192cb0f42670743bb88136374b8d97c
SHA11e39f090d8c5cd6927f5ab016b99638569e81f55
SHA256dbc4186f7507e930176339749805b95e07c7834341f853906c30f88d90a188d0
SHA5128890176882ced6d9fec884d95547778199030dcee7c9ede99d070ac343bf2f10b5073b53fe4e2b5baadacee94557310d5a134b61b858e352152e8916471625c9
-
Filesize
2KB
MD5eda5007911c51303e5462a759f07d173
SHA17173ada4f54550c20e14d045a2aec2e9264842a5
SHA256449275191cea4e60ec6346c5f8de9a168da3f2bb8245eb0e6b723962dcd50f96
SHA51209359a22084036ba58f9db29a9d5a1a049dbb01cc96db1c4e1fe74c987706c59eb44ebfd501a70236caa902f692327b9b3e34c2d8d5e1187fbc2b5575fa9f29a
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD59e64d7c459ebc7a0b9df171e5c5f2b0c
SHA1e061384aa2818f6cdf58b5921c5ddad2edee0778
SHA256f6d806db271d868d45c7beff81e345d6c1877596bd5df09f0d3bccc3190c7176
SHA512fe981206b443c4aa8787b60e5b94ac8e4a1288b878852d965d12c412a81d51586e08ea07b36416741502a903c3a0b2e5356727c552cde9390799e44586956ebc
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD510179760fc53ee3578416abf511a496e
SHA1ae0f0d16e44cb86ba0617ede69eaa42085fe300c
SHA256c9834d2e7fd53d66450b068e7062c643e94ae059b620c25fe6eceb9a9e9033f5
SHA5124973db9013bd05b522ee35e200e896d36095b838d243368f01eb2e9ab308f40ccb4ea7b91a42a464899602b6f920fc023d8c996b9ffc1f0e4dc76bd4bde73583
-
Filesize
108KB
MD52e1961a829eadbba74cb542c2596beac
SHA112d2e8607833a6367f9287441c0f6df0c72ded78
SHA25620cfefc58a832b3b1dd8d931207490f928dfd080b030ee4e2e33af02d7242a7f
SHA512d0fd4b415e41773a5658b2774103a9623c053062e008e9074bf44d07625c737f7e246203a80c7999a22f81ff096109d528e1d59f62d93326c111e5f9deef936c
-
Filesize
173KB
MD592ca1570dbd809d6cef4ef3259692d37
SHA1a5477b99c2eaf264890045ea21c85f74689a0746
SHA2569c75293b4cc3d7998bd5ae842ae8bb6c3d1d07bea98888dc2b37e3f910d9db1a
SHA512c3ee24f075bce15e046a171ccdd2e0eea7780bad7dbc32ccd817fd9beb984466c915e204142cf5ef585a60892b0cc2cbcf256190484437b46e241660139a29f3