Resubmissions

10/03/2025, 09:07

250310-k3h31azls8 10

10/03/2025, 05:44

250310-gfpeqavtgt 10

09/03/2025, 22:05

250309-1zppdasqy5 10

General

  • Target

    f626718989ccb5312634c7f6d762440d1013a40606e201fce3400bb28937a422.bin

  • Size

    976KB

  • Sample

    250310-k3h31azls8

  • MD5

    f8016d7d6eba809b3ea36a75773e8d1f

  • SHA1

    9328e319c5de14bcafa1675e372a24ace068293d

  • SHA256

    f626718989ccb5312634c7f6d762440d1013a40606e201fce3400bb28937a422

  • SHA512

    a558937779b75661718c87f69c1c32f975b4abf076497f6410376230dac62ab5d5fc49a2a09ccd7da9816b4166a2c98e366f558ef74adf5fb760e91eabeb093c

  • SSDEEP

    24576:Zg/j45OYQgHQUiItQeIDhqtU0cj4WZ25ubpM8mO1ab7zUO3:Zg/72QqUcYZ2kqaanzUC

Malware Config

Extracted

Family

ermac

C2

http://45.125.66.45

AES_key
AES_key

Targets

    • Target

      f626718989ccb5312634c7f6d762440d1013a40606e201fce3400bb28937a422.bin

    • Size

      976KB

    • MD5

      f8016d7d6eba809b3ea36a75773e8d1f

    • SHA1

      9328e319c5de14bcafa1675e372a24ace068293d

    • SHA256

      f626718989ccb5312634c7f6d762440d1013a40606e201fce3400bb28937a422

    • SHA512

      a558937779b75661718c87f69c1c32f975b4abf076497f6410376230dac62ab5d5fc49a2a09ccd7da9816b4166a2c98e366f558ef74adf5fb760e91eabeb093c

    • SSDEEP

      24576:Zg/j45OYQgHQUiItQeIDhqtU0cj4WZ25ubpM8mO1ab7zUO3:Zg/72QqUcYZ2kqaanzUC

    • Ermac

      An Android banking trojan first seen in July 2021.

    • Ermac family

    • Removes its main activity from the application launcher

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks