Resubmissions

10/03/2025, 09:07 UTC

250310-k3h31azls8 10

10/03/2025, 05:44 UTC

250310-gfpeqavtgt 10

09/03/2025, 22:05 UTC

250309-1zppdasqy5 10

General

  • Target

    f626718989ccb5312634c7f6d762440d1013a40606e201fce3400bb28937a422.bin

  • Size

    976KB

  • Sample

    250310-gfpeqavtgt

  • MD5

    f8016d7d6eba809b3ea36a75773e8d1f

  • SHA1

    9328e319c5de14bcafa1675e372a24ace068293d

  • SHA256

    f626718989ccb5312634c7f6d762440d1013a40606e201fce3400bb28937a422

  • SHA512

    a558937779b75661718c87f69c1c32f975b4abf076497f6410376230dac62ab5d5fc49a2a09ccd7da9816b4166a2c98e366f558ef74adf5fb760e91eabeb093c

  • SSDEEP

    24576:Zg/j45OYQgHQUiItQeIDhqtU0cj4WZ25ubpM8mO1ab7zUO3:Zg/72QqUcYZ2kqaanzUC

Malware Config

Extracted

Family

ermac

C2

http://45.125.66.45

AES_key
1
736f73695f736f7369736f6e5f5f5f5f
AES_key
1
3141317a5031655035514765666932444d505466544c35534c6d763744697666

Targets

    • Target

      f626718989ccb5312634c7f6d762440d1013a40606e201fce3400bb28937a422.bin

    • Size

      976KB

    • MD5

      f8016d7d6eba809b3ea36a75773e8d1f

    • SHA1

      9328e319c5de14bcafa1675e372a24ace068293d

    • SHA256

      f626718989ccb5312634c7f6d762440d1013a40606e201fce3400bb28937a422

    • SHA512

      a558937779b75661718c87f69c1c32f975b4abf076497f6410376230dac62ab5d5fc49a2a09ccd7da9816b4166a2c98e366f558ef74adf5fb760e91eabeb093c

    • SSDEEP

      24576:Zg/j45OYQgHQUiItQeIDhqtU0cj4WZ25ubpM8mO1ab7zUO3:Zg/72QqUcYZ2kqaanzUC

    • Ermac

      An Android banking trojan first seen in July 2021.

    • Ermac family

    • Removes its main activity from the application launcher

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.