General

  • Target

    52c86ec4b0e05589e620929c2d274cb702991ada0241ddbe985bd36e6c3b69fc.bin

  • Size

    3.7MB

  • Sample

    250319-1wxktayms2

  • MD5

    f22aaff1a86b5e39f89271edb5760859

  • SHA1

    529a4bf198d7ff202e2709ff8280cc2f2562c415

  • SHA256

    52c86ec4b0e05589e620929c2d274cb702991ada0241ddbe985bd36e6c3b69fc

  • SHA512

    a520ee4ab26dc47f16e261f8bc716030c793ff09ef1582f08511d432d4a651b652a1e3a7e2b4e1283b8ed14e87c04ceab7dab4fa5fb9a7d6bf6d4cb0eb6bd350

  • SSDEEP

    98304:TJzPxd4f3eT64q1lib7XILy3aDgt0LVH0jqm:92lcLcDi0eqm

Malware Config

Extracted

Family

ermac

C2

http://176.111.174.191

AES_key
AES_key

Targets

    • Target

      52c86ec4b0e05589e620929c2d274cb702991ada0241ddbe985bd36e6c3b69fc.bin

    • Size

      3.7MB

    • MD5

      f22aaff1a86b5e39f89271edb5760859

    • SHA1

      529a4bf198d7ff202e2709ff8280cc2f2562c415

    • SHA256

      52c86ec4b0e05589e620929c2d274cb702991ada0241ddbe985bd36e6c3b69fc

    • SHA512

      a520ee4ab26dc47f16e261f8bc716030c793ff09ef1582f08511d432d4a651b652a1e3a7e2b4e1283b8ed14e87c04ceab7dab4fa5fb9a7d6bf6d4cb0eb6bd350

    • SSDEEP

      98304:TJzPxd4f3eT64q1lib7XILy3aDgt0LVH0jqm:92lcLcDi0eqm

    • Ermac

      An Android banking trojan first seen in July 2021.

    • Ermac family

    • Ermac2 payload

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks