Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    13/04/2025, 02:13

General

  • Target

    889adceea7630db51ec63440a9d06f8309fb1568c556d2d60f47cbc02da8fb96.apk

  • Size

    2.1MB

  • MD5

    5b4ce4c84ad6cb33cbd232d606f39e22

  • SHA1

    cb14ac2d3efadac5d3bbab1e54988bd32f81bc87

  • SHA256

    889adceea7630db51ec63440a9d06f8309fb1568c556d2d60f47cbc02da8fb96

  • SHA512

    b2d805f7201dda9a188448664497b5942cc862afe8fac9342462a544de4064dda1cd4287988d36aafa0545eba11ddf83ec59817e7e9abc7d83a8026c64233080

  • SSDEEP

    49152:F//smWXDb9dPa8Peyl19AGfSprrz6vv+SiOrgR70S51BZY:5/sm2H9dyc/9HSprrz6H9bS51LY

Malware Config

Extracted

Family

ermac

C2

http://154.216.19.93

AES_key

Extracted

Family

hook

C2

http://154.216.19.93

AES_key

Signatures

  • Ermac

    An Android banking trojan first seen in July 2021.

  • Ermac family
  • Ermac2 payload 1 IoCs
  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Reads information about phone network operator. 1 TTPs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.kararamakarahfgsac.mararadk
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4720

Network

MITRE ATT&CK Mobile v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.kararamakarahfgsac.mararadk/app_buddy/oat/qimuMe.json.cur.prof

    Filesize

    2KB

    MD5

    c989a8a111f1d3aa1111abf7ef5de4f1

    SHA1

    b489da9dbd8a24ccf674caa0d82fdf196ab23901

    SHA256

    b2da75b0ad7212ae0f4050ce2ebaaf291815d1c1b2773f8867551e71ac824f24

    SHA512

    aeb765f3ff8579954886995fad551e09d9452f2ff1ea2dc8f3ffb05a934e22af3869d1d61cf5dee0808c0e59a2bf0394a948c31a0eb23f0ae6339f908240a71e

  • /data/data/com.kararamakarahfgsac.mararadk/app_buddy/qimuMe.json

    Filesize

    736KB

    MD5

    ab42483eb0c830c0b592cf922f0dd78e

    SHA1

    eecd7472139ff9a3b9de395685432b1d2f630ca9

    SHA256

    3c32eb57c2b510e1747088f52cf19a172d38aaa5af43ab5d243a91c95742a50f

    SHA512

    b2f3f99b73c35aa9cb2982f511aa03f0ca63d9f1419a5fbcb28927d3b53aafc0b7359528f7e6547eaeecc2055f2e414ad3c0a1e5b334f7ad9486e22ae884acff

  • /data/data/com.kararamakarahfgsac.mararadk/app_buddy/qimuMe.json

    Filesize

    736KB

    MD5

    840bcb002db4e54b56196124c1e80565

    SHA1

    4137d58593abb62f3e0c53b00aba9d0b12684665

    SHA256

    4a61b331d74b6e6176fd2af07f286a641e146ca0f598d35109bfef55989479f2

    SHA512

    cf5d2bb2e76c36d36ce039a2bb72994bcf189af7844899020a4fb28806ce38dca3f407e74c1bfa0ac971fdc755a4ae23d4c73d57b91d55502e7ff193c389b36a

  • /data/data/com.kararamakarahfgsac.mararadk/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.kararamakarahfgsac.mararadk/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    2ed23117bd020f17d4be956b12cc1d94

    SHA1

    6c8ee84e273f6241339c403c17964fcc5d503d48

    SHA256

    735e07e6ac2d44e1c2377b24131da416fe077c133631bc93563ce9b353d75ff8

    SHA512

    1f17bf50cb31a1b2a94607564612809519e09dbfad98ef69a64dca51bc96e64d5aab65d3fb118c2953e6743345fda621ac05173ecc36856d6d162b8372be6724

  • /data/data/com.kararamakarahfgsac.mararadk/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.kararamakarahfgsac.mararadk/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    2ca81637160bde0fa8fea2ab9454c053

    SHA1

    69e35df4264bca373257ec9ee8d4b97edcd0bc20

    SHA256

    9b86b44dadc002dbfad90223df10d5eaf5c8d52b655efd0e379ea6bf60a1e8b1

    SHA512

    37ed3e6927b393b598164f19d142f88702553e622b69b5818cfa5bbe707e15dabcb906f40a30e6cdba6929a1a1b3d910903cc29437fc75d540d4da7d41904baf

  • /data/data/com.kararamakarahfgsac.mararadk/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    08451dcdfbf1d3f09fa691d939db4725

    SHA1

    5094648e93629b8c6a89c77b0aff4424a2e0b026

    SHA256

    4eb2f6bc0de97478b1579fc8ea8103c7d6d2ae53c8b7b08497d09861cb122e0d

    SHA512

    526d9d723fcf12cd5420883b0b400bc875ea73ee6b7f92620a0d6b32b382d34dbc9fec21a6461e77dd9a633b0530453f9e78516ad8f71b72884e490f3c942b24

  • /data/data/com.kararamakarahfgsac.mararadk/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    9c53c59a8f0b1354ae423020c8c57620

    SHA1

    d1edc01adc6ac6dc2d7a7543752eed602063200f

    SHA256

    318cfd7f4e6657e3945e1b8ca380ecd5d83f814c4467e97cdfc84ca6d7ff1027

    SHA512

    b2d4f511b760b201971377a4d835b1f2f8402ba62e1fc77d3daf884c3fefd9cf050c930eb7e6d9503d9ddea55926d24cd2b88abef7ee877f675389a222da468a

  • /data/user/0/com.kararamakarahfgsac.mararadk/app_buddy/qimuMe.json

    Filesize

    1.7MB

    MD5

    d6e2c5ed461d65f8df2181cfef701968

    SHA1

    08d5b93228e77f3f28b7b08a226ee9efa41b3218

    SHA256

    42e0b6e8ad85eb998a6bcd82f95ff8558c78d3c3da8492f93815a0d1e033251b

    SHA512

    202b068e33054a0057808f50a16a762990149bf372cd71de5b219a431b1cedf38fa51505082fe2bde5bf53bfb5936736f580eeb6a13ec222243da7e466fa15f3