Analysis
-
max time kernel
148s -
max time network
153s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
19/03/2025, 22:00
Static task
static1
Behavioral task
behavioral1
Sample
00bf4f784cc5100cc2377d7645e71542607918d3399329a4b634d8eeea0fe1d3.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
00bf4f784cc5100cc2377d7645e71542607918d3399329a4b634d8eeea0fe1d3.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
00bf4f784cc5100cc2377d7645e71542607918d3399329a4b634d8eeea0fe1d3.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
00bf4f784cc5100cc2377d7645e71542607918d3399329a4b634d8eeea0fe1d3.apk
-
Size
1.2MB
-
MD5
0ee2c9a8d23c128f8b728d9dca61b353
-
SHA1
8519a49f458cbf6ddf2c6cd1c877d42e2f832c93
-
SHA256
00bf4f784cc5100cc2377d7645e71542607918d3399329a4b634d8eeea0fe1d3
-
SHA512
8e4cab6252fd5f2193769caec6e3f1df502d54f12812f999a53593453d4d1548948c568900b3fc532923b98ecf4360ec29f27b52fe0ffac35057c2e1e2a36d14
-
SSDEEP
24576:Ar5AcJOBLtAUqvblXWkQb7027QFv12GQAq6DVungSseWKU/kfKc:A91sLNqRX5QH020BoNIDYgSgfYX
Malware Config
Extracted
ermac
http://194.26.135.189
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac family
-
Ermac2 payload 1 IoCs
resource yara_rule behavioral3/files/fstream-12.dat family_ermac2 -
pid Process 4774 m36uk1.nhhxx.nn4zuj7 -
Loads dropped Dex/Jar 1 TTPs 12 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/m36uk1.nhhxx.nn4zuj7/app_g3tg.d45.rvd4.b6a/newobfs/0.pobfs 4774 m36uk1.nhhxx.nn4zuj7 /data/user/0/m36uk1.nhhxx.nn4zuj7/app_g3tg.d45.rvd4.b6a/newobfs/0.pobfs 4774 m36uk1.nhhxx.nn4zuj7 /data/user/0/m36uk1.nhhxx.nn4zuj7/app_g3tg.d45.rvd4.b6a/newobfs/1.pobfs 4774 m36uk1.nhhxx.nn4zuj7 /data/user/0/m36uk1.nhhxx.nn4zuj7/app_g3tg.d45.rvd4.b6a/newobfs/1.pobfs 4774 m36uk1.nhhxx.nn4zuj7 /data/user/0/m36uk1.nhhxx.nn4zuj7/app_g3tg.d45.rvd4.b6a/newobfs/2.pobfs 4774 m36uk1.nhhxx.nn4zuj7 /data/user/0/m36uk1.nhhxx.nn4zuj7/app_g3tg.d45.rvd4.b6a/newobfs/2.pobfs 4774 m36uk1.nhhxx.nn4zuj7 /data/user/0/m36uk1.nhhxx.nn4zuj7/app_g3tg.d45.rvd4.b6a/newobfs/3.pobfs 4774 m36uk1.nhhxx.nn4zuj7 /data/user/0/m36uk1.nhhxx.nn4zuj7/app_g3tg.d45.rvd4.b6a/newobfs/3.pobfs 4774 m36uk1.nhhxx.nn4zuj7 /data/user/0/m36uk1.nhhxx.nn4zuj7/app_g3tg.d45.rvd4.b6a/newobfs/4.pobfs 4774 m36uk1.nhhxx.nn4zuj7 /data/user/0/m36uk1.nhhxx.nn4zuj7/app_g3tg.d45.rvd4.b6a/newobfs/4.pobfs 4774 m36uk1.nhhxx.nn4zuj7 /data/user/0/m36uk1.nhhxx.nn4zuj7/app_g3tg.d45.rvd4.b6a/newobfs/5.pobfs 4774 m36uk1.nhhxx.nn4zuj7 /data/user/0/m36uk1.nhhxx.nn4zuj7/app_g3tg.d45.rvd4.b6a/newobfs/5.pobfs 4774 m36uk1.nhhxx.nn4zuj7 -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId m36uk1.nhhxx.nn4zuj7 Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId m36uk1.nhhxx.nn4zuj7 Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText m36uk1.nhhxx.nn4zuj7 -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener m36uk1.nhhxx.nn4zuj7 -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock m36uk1.nhhxx.nn4zuj7 -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground m36uk1.nhhxx.nn4zuj7 -
Performs UI accessibility actions on behalf of the user 1 TTPs 11 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction m36uk1.nhhxx.nn4zuj7 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction m36uk1.nhhxx.nn4zuj7 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction m36uk1.nhhxx.nn4zuj7 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction m36uk1.nhhxx.nn4zuj7 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction m36uk1.nhhxx.nn4zuj7 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction m36uk1.nhhxx.nn4zuj7 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction m36uk1.nhhxx.nn4zuj7 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction m36uk1.nhhxx.nn4zuj7 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction m36uk1.nhhxx.nn4zuj7 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction m36uk1.nhhxx.nn4zuj7 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction m36uk1.nhhxx.nn4zuj7 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone m36uk1.nhhxx.nn4zuj7 -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS m36uk1.nhhxx.nn4zuj7 -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal m36uk1.nhhxx.nn4zuj7 -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo m36uk1.nhhxx.nn4zuj7 -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo m36uk1.nhhxx.nn4zuj7
Processes
-
m36uk1.nhhxx.nn4zuj71⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4774
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5930848d8b36b9bdda307a0b651e0f6d4
SHA109fd7fc06733276012deee9d5527f579fc41c1c9
SHA256c09106228c280448690dc91430d5827e0c2f0838660e127bd1f25ec8fc323e29
SHA51209ad1ac9f8a20872935fecb523a8d744dd1deac638caea0976bc1bd3fe576fcf54ee36ede59180c3930c6668aac8cdab059fd91636c4e581ee5d4be87add14ba
-
Filesize
126KB
MD560fc19b58d8b451b41f9bdcbd1f0ca67
SHA189b895677e11e96f97801ff498a6be8f302c71b7
SHA25610c205629a03266ea7b28c73151551e19a9aeeefa8079dfe78781e370ec90c77
SHA512c7556f00df13a906f3b4941b9205586bebccd74cbd77818f302ba7f2e87607ed8ff5c04b61eb5589ec98d79e3f2f196cb7140000873ee7db59d18ca0f246f1d8
-
Filesize
30KB
MD573b5595e570f7a22f92de49e466d3c40
SHA1b24ad99990ef61c2eee73b9ceb60edbba65cd621
SHA2563fe3ce420c34ea08f30f9a844d9bed71a45899f24d960a8d6bdf57f0ca13c39e
SHA512f8b2c6764ba0f777a28d3a0d5402d1bea4f3926bd8f88a61326848c201e74a5c7af84072029f915c2e474cc98ebc7b2567c4c3477fe98e27c74cfa141e161b1f
-
Filesize
1KB
MD506a867a8f319bebf08c01fe618672a73
SHA15d5bace760d92bc1c048bcd2cacfcd30e310e0c6
SHA256fe25a21e8d232b3ba461a6fdfa6dda70b61ac5cecec200be9b4b0ec53408a49b
SHA5120700395a92b4e862ac557a9c7deee98f27d5af262a42d87c48314927edc2dc1d2c0603b2248101cb5e67ab0c2328dd277a23986fd5bb086000c686cb837863ee
-
Filesize
3KB
MD5236814b3bbe6c9a512fc7526256d799f
SHA15e9b1288c56678581f52e70cc2975ee05040e450
SHA256d23813e047b8d088b935872fc55ccbdf0f2cd2676d3ae6568236119c8b2b71ae
SHA5120e631664050a635bffcb02fb9c7993f572b3d7a9862f01ef7adf005df9da62efac789299028e07d333aa27196ab2e59ffd993f3083e18e8b559aef9267c4fc31
-
Filesize
541KB
MD5a0a0f176952e3d88c73ea49b8eb82dab
SHA17402683535b9365fe4b449f02f3f257f88c11006
SHA256baf2de6faff8af304f869a25f5d9af7e8583fd7f6f90a744805c65818b7b2a18
SHA512bdda0f180ecd132cafa28baf81be6100edeeb76b70daa42cce8f250c3a3e387c3c49ee2e22da96be6130560eb2599c9ab9215ea3d7419bd3bbb8dbe9ce696109