Analysis
-
max time kernel
147s -
max time network
151s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
19/03/2025, 22:00
Static task
static1
Behavioral task
behavioral1
Sample
41baf399eb5cbe2734e59083db34a746b75680e59cc6479b7185c24bbe5e6945.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
41baf399eb5cbe2734e59083db34a746b75680e59cc6479b7185c24bbe5e6945.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
41baf399eb5cbe2734e59083db34a746b75680e59cc6479b7185c24bbe5e6945.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
41baf399eb5cbe2734e59083db34a746b75680e59cc6479b7185c24bbe5e6945.apk
-
Size
3.2MB
-
MD5
2c2c5de98617fc870459f528bb6abb91
-
SHA1
b33b46aaf2380accca4fac3224810e281ccd7f1e
-
SHA256
41baf399eb5cbe2734e59083db34a746b75680e59cc6479b7185c24bbe5e6945
-
SHA512
5be9eeb54b44585b91e6afecdfb2dadc35931795ba92a9771e32fb4d33e8e8edb4b41569afdb67860a2e7530fb5d68f540c2dea9c447943938755cf6f69f3692
-
SSDEEP
49152:9Br0Fq9Ttu/GgSg468yO5V2sYbzlX5bqlApkC4YR5AGqJ5IDmO+nnVcTG1:30kt0Lx8yOlYTqlApknYRiJ5IhInMG1
Malware Config
Extracted
ermac
http://194.26.135.189
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac family
-
Ermac2 payload 1 IoCs
resource yara_rule behavioral2/files/fstream-2.dat family_ermac2 -
pid Process 5139 tdjhp.lidc02co.a4dfy -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/tdjhp.lidc02co.a4dfy/app_ty3u.j0d.t090.r0o/newobfs/0.pobfs 5139 tdjhp.lidc02co.a4dfy /data/user/0/tdjhp.lidc02co.a4dfy/app_ty3u.j0d.t090.r0o/newobfs/0.pobfs 5139 tdjhp.lidc02co.a4dfy -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId tdjhp.lidc02co.a4dfy Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId tdjhp.lidc02co.a4dfy Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText tdjhp.lidc02co.a4dfy -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener tdjhp.lidc02co.a4dfy -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock tdjhp.lidc02co.a4dfy -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground tdjhp.lidc02co.a4dfy -
Performs UI accessibility actions on behalf of the user 1 TTPs 11 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction tdjhp.lidc02co.a4dfy android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction tdjhp.lidc02co.a4dfy android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction tdjhp.lidc02co.a4dfy android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction tdjhp.lidc02co.a4dfy android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction tdjhp.lidc02co.a4dfy android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction tdjhp.lidc02co.a4dfy android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction tdjhp.lidc02co.a4dfy android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction tdjhp.lidc02co.a4dfy android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction tdjhp.lidc02co.a4dfy android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction tdjhp.lidc02co.a4dfy android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction tdjhp.lidc02co.a4dfy -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone tdjhp.lidc02co.a4dfy -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver tdjhp.lidc02co.a4dfy -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal tdjhp.lidc02co.a4dfy -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo tdjhp.lidc02co.a4dfy -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo tdjhp.lidc02co.a4dfy
Processes
-
tdjhp.lidc02co.a4dfy1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:5139
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
757KB
MD520c1d3dedd185e0f5800c63e847894e0
SHA153a3c0c2208bcc7e6dc1269f19db628a753d262a
SHA256af90dd2cb28a5812917be710b00e785d7150722ffa9122d78ad9c924d1cb1e9f
SHA512d26e1e082f40584ddb399b440e5e18e0ef12e2ef79019c29edaf537b91eaf9046630229a6e7e5ce6551d79991bb75c11b672ba65a633899a34e4eec7a5a9bddd