Resubmissions

13/04/2025, 02:09

250413-clm2mawzb1 10

10/04/2025, 22:01

250410-1xa37ssrt3 10

Analysis

  • max time kernel
    148s
  • max time network
    159s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    10/04/2025, 22:01

General

  • Target

    889adceea7630db51ec63440a9d06f8309fb1568c556d2d60f47cbc02da8fb96.apk

  • Size

    2.1MB

  • MD5

    5b4ce4c84ad6cb33cbd232d606f39e22

  • SHA1

    cb14ac2d3efadac5d3bbab1e54988bd32f81bc87

  • SHA256

    889adceea7630db51ec63440a9d06f8309fb1568c556d2d60f47cbc02da8fb96

  • SHA512

    b2d805f7201dda9a188448664497b5942cc862afe8fac9342462a544de4064dda1cd4287988d36aafa0545eba11ddf83ec59817e7e9abc7d83a8026c64233080

  • SSDEEP

    49152:F//smWXDb9dPa8Peyl19AGfSprrz6vv+SiOrgR70S51BZY:5/sm2H9dyc/9HSprrz6H9bS51LY

Malware Config

Extracted

Family

ermac

C2

http://154.216.19.93

AES_key

Extracted

Family

hook

C2

http://154.216.19.93

AES_key

Signatures

  • Ermac

    An Android banking trojan first seen in July 2021.

  • Ermac family
  • Ermac2 payload 1 IoCs
  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Reads information about phone network operator. 1 TTPs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.kararamakarahfgsac.mararadk
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4853

Network

MITRE ATT&CK Mobile v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.kararamakarahfgsac.mararadk/app_buddy/oat/qimuMe.json.cur.prof

    Filesize

    2KB

    MD5

    c989a8a111f1d3aa1111abf7ef5de4f1

    SHA1

    b489da9dbd8a24ccf674caa0d82fdf196ab23901

    SHA256

    b2da75b0ad7212ae0f4050ce2ebaaf291815d1c1b2773f8867551e71ac824f24

    SHA512

    aeb765f3ff8579954886995fad551e09d9452f2ff1ea2dc8f3ffb05a934e22af3869d1d61cf5dee0808c0e59a2bf0394a948c31a0eb23f0ae6339f908240a71e

  • /data/data/com.kararamakarahfgsac.mararadk/app_buddy/qimuMe.json

    Filesize

    736KB

    MD5

    ab42483eb0c830c0b592cf922f0dd78e

    SHA1

    eecd7472139ff9a3b9de395685432b1d2f630ca9

    SHA256

    3c32eb57c2b510e1747088f52cf19a172d38aaa5af43ab5d243a91c95742a50f

    SHA512

    b2f3f99b73c35aa9cb2982f511aa03f0ca63d9f1419a5fbcb28927d3b53aafc0b7359528f7e6547eaeecc2055f2e414ad3c0a1e5b334f7ad9486e22ae884acff

  • /data/data/com.kararamakarahfgsac.mararadk/app_buddy/qimuMe.json

    Filesize

    736KB

    MD5

    840bcb002db4e54b56196124c1e80565

    SHA1

    4137d58593abb62f3e0c53b00aba9d0b12684665

    SHA256

    4a61b331d74b6e6176fd2af07f286a641e146ca0f598d35109bfef55989479f2

    SHA512

    cf5d2bb2e76c36d36ce039a2bb72994bcf189af7844899020a4fb28806ce38dca3f407e74c1bfa0ac971fdc755a4ae23d4c73d57b91d55502e7ff193c389b36a

  • /data/data/com.kararamakarahfgsac.mararadk/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.kararamakarahfgsac.mararadk/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    06fac95c05fb9d50b1023b20cd8ad6f4

    SHA1

    f179ea521abbf80623a8ce09c9ad6a53b55bd4bc

    SHA256

    a4ce146e4d1d390ab931c7d2a71ceb34595320192624d6a4889bbf5fef2863d0

    SHA512

    34b605678a368e6a7c1e1bfac2464d6e0529490800c16d348ea2a04efed5cae2fe1660fc605482f001ee0bac4da127a858939a1c635aea281b62413c1af43770

  • /data/data/com.kararamakarahfgsac.mararadk/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.kararamakarahfgsac.mararadk/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    79be1cd3e11aab5d945c992e05fd647c

    SHA1

    27b684ed74b3758c01fe2f40be86ae12afd10db7

    SHA256

    b4071045dd9c226333d999dc3dce6a806eb242da0a2f480e483b75bdd2dac8dc

    SHA512

    a4767e0f826ccdf0d5610a8437dc280b2156aa3e37fc093155333619f02bc8ff466a535ad652b7eb23db1c889ff980e1e17b74ef2a7f51299cec4c130c99a205

  • /data/data/com.kararamakarahfgsac.mararadk/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    7663a32d202501cc11226b27c19d632e

    SHA1

    f2c0bddbf57055b1dc59fece7c600f8a461300d6

    SHA256

    ef90f4157c716ed5db0a8171bcc283e93a91aaeffb41de9464ade3eb1eb0c5e0

    SHA512

    9cad061de3034cd6fa0772d8c2dcbc69a6d0e36cce6d91602a95010f6ea40534208f34ddf812675e20d636fff790961351d8c79a7427192712de31e2abdfbfd6

  • /data/data/com.kararamakarahfgsac.mararadk/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    6d7a81525cebb148751cf5fd07cdc524

    SHA1

    b3f31e8683d0297dd40887ac6987619b37e24e8a

    SHA256

    4dbcb09856fb94d61f47bdb06ef0f10fd535e237bc99e06f4ffc1763fb73b285

    SHA512

    7149d15374a32f09b240bc8199b141d6f071d3b630b372dc053ef0aa26ff089277ca4f7f301889192b385a5f7a14d5c4a1585890a615da1dd96845d99dee3790

  • /data/user/0/com.kararamakarahfgsac.mararadk/app_buddy/qimuMe.json

    Filesize

    1.7MB

    MD5

    d6e2c5ed461d65f8df2181cfef701968

    SHA1

    08d5b93228e77f3f28b7b08a226ee9efa41b3218

    SHA256

    42e0b6e8ad85eb998a6bcd82f95ff8558c78d3c3da8492f93815a0d1e033251b

    SHA512

    202b068e33054a0057808f50a16a762990149bf372cd71de5b219a431b1cedf38fa51505082fe2bde5bf53bfb5936736f580eeb6a13ec222243da7e466fa15f3