Analysis
-
max time kernel
148s -
max time network
152s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
19/03/2025, 22:00
Static task
static1
Behavioral task
behavioral1
Sample
41baf399eb5cbe2734e59083db34a746b75680e59cc6479b7185c24bbe5e6945.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
41baf399eb5cbe2734e59083db34a746b75680e59cc6479b7185c24bbe5e6945.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
41baf399eb5cbe2734e59083db34a746b75680e59cc6479b7185c24bbe5e6945.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
41baf399eb5cbe2734e59083db34a746b75680e59cc6479b7185c24bbe5e6945.apk
-
Size
3.2MB
-
MD5
2c2c5de98617fc870459f528bb6abb91
-
SHA1
b33b46aaf2380accca4fac3224810e281ccd7f1e
-
SHA256
41baf399eb5cbe2734e59083db34a746b75680e59cc6479b7185c24bbe5e6945
-
SHA512
5be9eeb54b44585b91e6afecdfb2dadc35931795ba92a9771e32fb4d33e8e8edb4b41569afdb67860a2e7530fb5d68f540c2dea9c447943938755cf6f69f3692
-
SSDEEP
49152:9Br0Fq9Ttu/GgSg468yO5V2sYbzlX5bqlApkC4YR5AGqJ5IDmO+nnVcTG1:30kt0Lx8yOlYTqlApknYRiJ5IhInMG1
Malware Config
Extracted
ermac
http://194.26.135.189
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac family
-
Ermac2 payload 1 IoCs
resource yara_rule behavioral3/files/fstream-2.dat family_ermac2 -
pid Process 4772 tdjhp.lidc02co.a4dfy -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/tdjhp.lidc02co.a4dfy/app_ty3u.j0d.t090.r0o/newobfs/0.pobfs 4772 tdjhp.lidc02co.a4dfy /data/user/0/tdjhp.lidc02co.a4dfy/app_ty3u.j0d.t090.r0o/newobfs/0.pobfs 4772 tdjhp.lidc02co.a4dfy -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText tdjhp.lidc02co.a4dfy Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId tdjhp.lidc02co.a4dfy Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId tdjhp.lidc02co.a4dfy -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener tdjhp.lidc02co.a4dfy -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock tdjhp.lidc02co.a4dfy -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground tdjhp.lidc02co.a4dfy -
Performs UI accessibility actions on behalf of the user 1 TTPs 11 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction tdjhp.lidc02co.a4dfy android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction tdjhp.lidc02co.a4dfy android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction tdjhp.lidc02co.a4dfy android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction tdjhp.lidc02co.a4dfy android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction tdjhp.lidc02co.a4dfy android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction tdjhp.lidc02co.a4dfy android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction tdjhp.lidc02co.a4dfy android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction tdjhp.lidc02co.a4dfy android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction tdjhp.lidc02co.a4dfy android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction tdjhp.lidc02co.a4dfy android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction tdjhp.lidc02co.a4dfy -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone tdjhp.lidc02co.a4dfy -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS tdjhp.lidc02co.a4dfy -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal tdjhp.lidc02co.a4dfy -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo tdjhp.lidc02co.a4dfy -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo tdjhp.lidc02co.a4dfy
Processes
-
tdjhp.lidc02co.a4dfy1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4772
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
757KB
MD520c1d3dedd185e0f5800c63e847894e0
SHA153a3c0c2208bcc7e6dc1269f19db628a753d262a
SHA256af90dd2cb28a5812917be710b00e785d7150722ffa9122d78ad9c924d1cb1e9f
SHA512d26e1e082f40584ddb399b440e5e18e0ef12e2ef79019c29edaf537b91eaf9046630229a6e7e5ce6551d79991bb75c11b672ba65a633899a34e4eec7a5a9bddd