Analysis
-
max time kernel
179s -
max time network
131s -
platform
android_x86 -
resource
android-x86-arm-20240611.1-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system -
submitted
19-06-2024 22:18
Static task
static1
Behavioral task
behavioral1
Sample
7c2cda3b77b484079af1befae1d9554b025af1ca159da99a62bbfbd5fb51b300.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
7c2cda3b77b484079af1befae1d9554b025af1ca159da99a62bbfbd5fb51b300.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
7c2cda3b77b484079af1befae1d9554b025af1ca159da99a62bbfbd5fb51b300.apk
Resource
android-x64-arm64-20240611.1-en
General
-
Target
7c2cda3b77b484079af1befae1d9554b025af1ca159da99a62bbfbd5fb51b300.apk
-
Size
1.4MB
-
MD5
5a0591c31da2d2b20118bc16c4698c0a
-
SHA1
1ed5da21fb4bb5cda23045472c1d989d093be6d1
-
SHA256
7c2cda3b77b484079af1befae1d9554b025af1ca159da99a62bbfbd5fb51b300
-
SHA512
a50e92bfb98d34430ebcd78d5cd026d1b1e44f0b33ae339ad9a72733e8686204096a7f739e580d763746a4bcab90eefbfb2349b0806a63ef74f108881710a2b4
-
SSDEEP
24576:mkopFfVA7ttINY8xgLPbyIa86q6gPQ2dJp++ReNJSyOMAx5ZyW1:WDfGtINYZmDJqvQ2f76EcuZD1
Malware Config
Extracted
ermac
Extracted
hook
Signatures
-
Ermac
An Android banking trojan first seen in July 2021.
-
Ermac2 payload 2 IoCs
Processes:
resource yara_rule /data/data/com.ranixebovura.delasawa/app_ded/ZiHrSbycxxHHsTXPcKPnaY3PW1Yb5Qat.dex family_ermac2 /data/user/0/com.ranixebovura.delasawa/app_ded/ZiHrSbycxxHHsTXPcKPnaY3PW1Yb5Qat.dex family_ermac2 -
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.ranixebovura.delasawa/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ranixebovura.delasawa/app_ded/ZiHrSbycxxHHsTXPcKPnaY3PW1Yb5Qat.dex --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.ranixebovura.delasawa/app_ded/oat/x86/ZiHrSbycxxHHsTXPcKPnaY3PW1Yb5Qat.odex --compiler-filter=quicken --class-loader-context=&ioc pid process /data/user/0/com.ranixebovura.delasawa/app_ded/ZiHrSbycxxHHsTXPcKPnaY3PW1Yb5Qat.dex 4260 com.ranixebovura.delasawa /data/user/0/com.ranixebovura.delasawa/app_ded/ZiHrSbycxxHHsTXPcKPnaY3PW1Yb5Qat.dex 4292 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ranixebovura.delasawa/app_ded/ZiHrSbycxxHHsTXPcKPnaY3PW1Yb5Qat.dex --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.ranixebovura.delasawa/app_ded/oat/x86/ZiHrSbycxxHHsTXPcKPnaY3PW1Yb5Qat.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.ranixebovura.delasawa/app_ded/ZiHrSbycxxHHsTXPcKPnaY3PW1Yb5Qat.dex 4260 com.ranixebovura.delasawa -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.ranixebovura.delasawadescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.ranixebovura.delasawa Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.ranixebovura.delasawa Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.ranixebovura.delasawa -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.ranixebovura.delasawadescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.ranixebovura.delasawa -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.ranixebovura.delasawadescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.ranixebovura.delasawa -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.ranixebovura.delasawadescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.ranixebovura.delasawa -
Performs UI accessibility actions on behalf of the user 1 TTPs 6 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.ranixebovura.delasawaioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ranixebovura.delasawa android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ranixebovura.delasawa android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ranixebovura.delasawa android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ranixebovura.delasawa android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ranixebovura.delasawa android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ranixebovura.delasawa -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.ranixebovura.delasawadescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.ranixebovura.delasawa -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.ranixebovura.delasawadescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.ranixebovura.delasawa -
Reads information about phone network operator. 1 TTPs
-
Requests enabling of the accessibility settings. 1 IoCs
Processes:
com.ranixebovura.delasawadescription ioc process Intent action android.settings.ACCESSIBILITY_SETTINGS com.ranixebovura.delasawa -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.ranixebovura.delasawadescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.ranixebovura.delasawa -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.ranixebovura.delasawadescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.ranixebovura.delasawa -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.ranixebovura.delasawadescription ioc process Framework API call javax.crypto.Cipher.doFinal com.ranixebovura.delasawa
Processes
-
com.ranixebovura.delasawa1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Requests enabling of the accessibility settings.
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
-
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ranixebovura.delasawa/app_ded/ZiHrSbycxxHHsTXPcKPnaY3PW1Yb5Qat.dex --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.ranixebovura.delasawa/app_ded/oat/x86/ZiHrSbycxxHHsTXPcKPnaY3PW1Yb5Qat.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.ranixebovura.delasawa/app_ded/ZiHrSbycxxHHsTXPcKPnaY3PW1Yb5Qat.dexFilesize
1.5MB
MD530e4337aa68709c8f6ce01b80152e81d
SHA10a5ca096e3b56b6bdb8c2a001389a20ac2fe74b2
SHA2567019c6bfd4a49e1fd27aab97bcd586ffa244c3c68401cdd8b07925b6e68c7f52
SHA512879d2cba8a8914439f5f4960e778472a721c5b2162fff98a480bb9af7b9f08a4914d766c84f20e789123d219975bcd1bc21c24a8d7bdfd9b7a18dda7bc86ab4a
-
/data/data/com.ranixebovura.delasawa/no_backup/androidx.work.workdbFilesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
/data/data/com.ranixebovura.delasawa/no_backup/androidx.work.workdb-journalFilesize
512B
MD5998bd8adfcd69f09a5faedc513cb1bea
SHA154860f3e5c482b266d18f92f637626ece4d48a20
SHA256a858d410cc689b8598041f0d60ec2215bcaff8383c59d5fbf8e2cb22a052c711
SHA51222c15377346adf84698d016fc466b0ed86f1216db597fc2004a7a4354308f9269fcf2a26a65a1e84e5941abbfbd5ec7b8a3c0599206bfd64b6d8c2f9eaf01356
-
/data/data/com.ranixebovura.delasawa/no_backup/androidx.work.workdb-shmFilesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
/data/data/com.ranixebovura.delasawa/no_backup/androidx.work.workdb-walFilesize
173KB
MD5f67f2d622cbad4da066196fae6e80c6b
SHA159029ced079245026a527603687c5fc3c3d1a4fb
SHA2564dc01c7af90c86eb7938f290e3212711446682fcbaa485a3ec65d7fda4764241
SHA51234660fa745f44b8f31643b5760f574b377d5a3a56bbce3b195b1220dd92f59b142e67643522735111fd49cf60c021771f68917470eb0554c2cd52bbd258b1c40
-
/data/data/com.ranixebovura.delasawa/no_backup/androidx.work.workdb-walFilesize
16KB
MD50eed69fda2f7357c78eb26ef7704e706
SHA18a67ad9932b2100e76630ab4615aaf4d31b2841d
SHA25643e5b807522fa1dadf179a1489245b24b202c1e310461dbd24852cbb650e2e31
SHA51244c1135e42ef712d5fa4d20584887851dae41df2ce815dc60581fa08822dec2d147e7a3212a8e6463c75fa0a6974340ddaec89b929db9deee116d1dbc0c249a6
-
/data/data/com.ranixebovura.delasawa/no_backup/androidx.work.workdb-walFilesize
108KB
MD5042116caa10b784351e4485f7d4ccf3a
SHA102caa15d97579cb2dd5199fe22d047a0e7414168
SHA256ac2ad1893d3212164165f48a7a4fc5ad6edaeb7234a5ba7ac59fb15319628b2b
SHA5129e0311a52e14a1a2354cf37f67d174dae9e9d27d8abf74ef5444bfe1e6fa6386d9c751ca6a5fa9b77ff59244cba87849865a508a44b8ad7b088e59ef4e623966
-
/data/user/0/com.ranixebovura.delasawa/app_ded/ZiHrSbycxxHHsTXPcKPnaY3PW1Yb5Qat.dexFilesize
1.5MB
MD5799add7144037575f35d6e6b8ae845e9
SHA1a66dd3f36f8cbad318ceb4229522b55561e97ce7
SHA256a3c755a919f71d960388992c704e27844bce6f6661068b265963a06ae156d688
SHA512f70bd5cb515c6b286b0fcf7a3a11cda23027ce09601448755c0d51b7341c33197e15b645b99040b2b5ac3a91e405d6e0799081995856232520bd455ed66a898f