Analysis
-
max time kernel
148s -
max time network
155s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
19/03/2025, 22:00
Static task
static1
Behavioral task
behavioral1
Sample
82a8181e20cb19e11cc2af9144b8ab135e8ca8245f39c025a23d820a526f2d92.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
82a8181e20cb19e11cc2af9144b8ab135e8ca8245f39c025a23d820a526f2d92.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
82a8181e20cb19e11cc2af9144b8ab135e8ca8245f39c025a23d820a526f2d92.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
82a8181e20cb19e11cc2af9144b8ab135e8ca8245f39c025a23d820a526f2d92.apk
-
Size
2.6MB
-
MD5
9a7a600daac480476394145a9f57b9bf
-
SHA1
8d729325e7c964d401d62c235f117f8f7a9f67ce
-
SHA256
82a8181e20cb19e11cc2af9144b8ab135e8ca8245f39c025a23d820a526f2d92
-
SHA512
f8948999a6dd8a0f0bad92be808073030a4038e08cefcdeb07a8d30db3466a569d78182416e2588dbf9803d9e6aa1b79244b0ebc919eb71398bb0ea0dce3a8ee
-
SSDEEP
49152:89mTfBTWdDnO6lYdsuHq6pr4f/n3WjdyrZtNFz78vRbLw9:8ATJLcV6pGn3Wjd2KZnG
Malware Config
Extracted
ermac
http://193.106.191.121
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac family
-
Ermac2 payload 2 IoCs
resource yara_rule behavioral1/memory/4251-0.dex family_ermac2 behavioral1/memory/4222-0.dex family_ermac2 -
pid Process 4222 com.pqzlibitu.lwqdettlw -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.pqzlibitu.lwqdettlw/gjtuhytoat/fjdHhify9t8hHak/base.apk.app8aio1.pjg 4251 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.pqzlibitu.lwqdettlw/gjtuhytoat/fjdHhify9t8hHak/base.apk.app8aio1.pjg --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.pqzlibitu.lwqdettlw/gjtuhytoat/fjdHhify9t8hHak/oat/x86/base.apk.app8aio1.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.pqzlibitu.lwqdettlw/gjtuhytoat/fjdHhify9t8hHak/base.apk.app8aio1.pjg 4222 com.pqzlibitu.lwqdettlw -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.pqzlibitu.lwqdettlw Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.pqzlibitu.lwqdettlw Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.pqzlibitu.lwqdettlw -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.pqzlibitu.lwqdettlw -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.pqzlibitu.lwqdettlw -
Performs UI accessibility actions on behalf of the user 1 TTPs 11 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.pqzlibitu.lwqdettlw android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.pqzlibitu.lwqdettlw android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.pqzlibitu.lwqdettlw android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.pqzlibitu.lwqdettlw android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.pqzlibitu.lwqdettlw android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.pqzlibitu.lwqdettlw android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.pqzlibitu.lwqdettlw android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.pqzlibitu.lwqdettlw android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.pqzlibitu.lwqdettlw android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.pqzlibitu.lwqdettlw android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.pqzlibitu.lwqdettlw -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.pqzlibitu.lwqdettlw -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.pqzlibitu.lwqdettlw -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.pqzlibitu.lwqdettlw -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.pqzlibitu.lwqdettlw -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.pqzlibitu.lwqdettlw -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.pqzlibitu.lwqdettlw
Processes
-
com.pqzlibitu.lwqdettlw1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4222 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.pqzlibitu.lwqdettlw/gjtuhytoat/fjdHhify9t8hHak/base.apk.app8aio1.pjg --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.pqzlibitu.lwqdettlw/gjtuhytoat/fjdHhify9t8hHak/oat/x86/base.apk.app8aio1.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4251
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.pqzlibitu.lwqdettlw/gjtuhytoat/fjdHhify9t8hHak/tmp-base.apk.app8aio3936146060304710726.pjg
Filesize721KB
MD56ef775e4680abc4304e4e9656016a2bd
SHA19d9b276f704df33e5456109ae81691f074a11a0e
SHA25608445281820c9eba23fd9d4a5744e8e6ca89b8ce84593e5b1c98df56f9d99163
SHA51249534ef1bd40cb60b54ea438a8ec17802e37ac611f7136e5a69ffef998cd2d1a6eed5cbdb1c12d3ce9931e5244162d32fa2da5c6dd07bdd46d9059076a97075a
-
Filesize
1.3MB
MD596bef1e72b60b29d1d9b8a645da26956
SHA147664430e8da5bcc94f78adbc6f9dc51544ed30a
SHA25607c368757a04ab489b1dff10a4bf1852da5408f277a817020b19bd2cbde2e69c
SHA5121e68e2437a867724c64c653887e80eca5df56c2da9123aa240c2bb680cfa456fed262ed584d4bde5ea2fd9b9575796c0d0cb41faa130f1b9037dbddde00b3405
-
Filesize
1.3MB
MD5229fb2ed58027855e7444cf7baf3a189
SHA1df7557eb1c541f5d3d7c155e6e4ebbec547bc234
SHA256bfa98b40463e79b2d502c69722f7b7fd063097ac3de4980305ce3f7259551947
SHA5122f9bc4e3fb60363e69c563955e2a412109af23d17a8ea28dddf924139589a1861473798c94ac54515c7dcc5b958e24e77d4a564c21362a9ab2cdfdc1a7079ed5