General

  • Target

    15cbd3bb713080b652522e82ce3f73b0b8dff403180b5c581616c41a47a77a46.bin

  • Size

    2.3MB

  • Sample

    250401-16ccmaxshy

  • MD5

    9a4654476dace477d64335a25636eda5

  • SHA1

    9c35dacfe1f1030d4e834d5f8f8e08e1e96968c6

  • SHA256

    15cbd3bb713080b652522e82ce3f73b0b8dff403180b5c581616c41a47a77a46

  • SHA512

    8c61ec965e27f9f6a033f1638d1311583e2a1bfce58a45dd5487241c056871460a8d35334c95585bb5250f1ab188131b1f4b4abe327d93213dd352a46a2c88ea

  • SSDEEP

    49152:E0o1Tm0qHy7UA8s7NUFqK9HMee5RCFpOnCh4riDa:EN1TmcD8ENUFJseeHUcjim

Malware Config

Extracted

Family

ermac

C2

http://aunuredvac.xyz

http://aumvzxzebra.xyz

http://auvzmashinadx.xyz

AES_key

Extracted

Family

hook

C2

http://aunuredvac.xyz

http://aumvzxzebra.xyz

http://auvzmashinadx.xyz

AES_key

Targets

    • Target

      15cbd3bb713080b652522e82ce3f73b0b8dff403180b5c581616c41a47a77a46.bin

    • Size

      2.3MB

    • MD5

      9a4654476dace477d64335a25636eda5

    • SHA1

      9c35dacfe1f1030d4e834d5f8f8e08e1e96968c6

    • SHA256

      15cbd3bb713080b652522e82ce3f73b0b8dff403180b5c581616c41a47a77a46

    • SHA512

      8c61ec965e27f9f6a033f1638d1311583e2a1bfce58a45dd5487241c056871460a8d35334c95585bb5250f1ab188131b1f4b4abe327d93213dd352a46a2c88ea

    • SSDEEP

      49152:E0o1Tm0qHy7UA8s7NUFqK9HMee5RCFpOnCh4riDa:EN1TmcD8ENUFJseeHUcjim

    • Ermac

      An Android banking trojan first seen in July 2021.

    • Ermac family

    • Ermac2 payload

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Hook family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks