Skip to main content

ERMAC V3.0 Banking Trojan: Full Source Code Leak and Infrastructure Analysis

Medium
Published: Fri Aug 15 2025 (08/15/2025, 05:29:20 UTC)
Source: AlienVault OTX General

Description

The complete source code for ERMAC V3.0, an advanced banking trojan, was discovered and analyzed, providing rare insight into this active Malware-as-a-Service platform. ERMAC has evolved to target over 700 financial and cryptocurrency apps, employing sophisticated form injection techniques and encrypted communications. The analysis revealed critical vulnerabilities, including hardcoded credentials and default tokens, which could be exploited to disrupt operations. The malware's infrastructure consists of a Laravel-based C2 backend, React control panel, Golang exfiltration service, and an obfuscated Android backdoor. This comprehensive examination exposes the operational risks of the MaaS model and equips defenders with concrete methods to track, detect, and disrupt active ERMAC campaigns.

AI-Powered Analysis

AILast updated: 08/15/2025, 13:03:23 UTC

Technical Analysis

ERMAC V3.0 is an advanced banking trojan whose complete source code was leaked and subsequently analyzed, providing rare insight into its Malware-as-a-Service (MaaS) operational model. This trojan targets over 700 financial and cryptocurrency applications, leveraging sophisticated form injection techniques to intercept user credentials and financial data. It employs encrypted communications to evade detection and maintain stealth. The malware infrastructure is complex, consisting of a Laravel-based command and control (C2) backend, a React-based control panel, a Golang exfiltration service, and an obfuscated Android backdoor component. Notably, the source code leak revealed critical operational vulnerabilities such as hardcoded credentials and default tokens within the malware infrastructure, which could be exploited by defenders or attackers to disrupt or hijack the malware operations. ERMAC uses multiple advanced techniques including hooking (T1056.001), encrypted communications (T1071), persistence mechanisms (T1053), credential dumping (T1005), obfuscation (T1027), and user execution (T1204). The MaaS model allows multiple threat actors to deploy customized versions of ERMAC, increasing its threat surface. Although no known exploits are currently active in the wild, the availability of the full source code increases the risk of new variants or attacks emerging. The analysis equips defenders with concrete methods to detect, track, and disrupt ERMAC campaigns by monitoring known indicators such as specific file hashes and IP addresses associated with its infrastructure.

Potential Impact

For European organizations, especially financial institutions and cryptocurrency service providers, ERMAC V3.0 poses a significant threat to confidentiality and integrity of sensitive financial data. Successful infections could lead to theft of banking credentials, unauthorized transactions, and financial fraud. The encrypted communication channels and sophisticated form injection techniques make detection challenging, increasing the risk of prolonged undetected breaches. The leak of the source code also means that threat actors in Europe could develop tailored variants targeting region-specific financial apps, increasing attack efficacy. Additionally, the presence of hardcoded credentials in the malware infrastructure could be exploited by defenders or attackers to disrupt or hijack ongoing campaigns, potentially causing operational instability in affected networks. The Android backdoor component expands the attack surface to mobile banking users, a growing vector in Europe due to widespread smartphone usage. Overall, the threat could undermine trust in digital financial services and cause direct financial losses, regulatory penalties, and reputational damage for European organizations.

Mitigation Recommendations

European organizations should implement targeted detection and prevention strategies beyond generic advice. Specifically: 1) Deploy advanced endpoint detection and response (EDR) solutions capable of detecting form injection and hooking techniques used by ERMAC. 2) Monitor network traffic for encrypted communications to known ERMAC C2 IP addresses and domains, leveraging threat intelligence feeds containing the identified IPs and hashes. 3) Conduct regular threat hunting exercises focused on indicators of compromise (IOCs) such as the provided file hashes and IP addresses. 4) Harden mobile device management (MDM) policies to restrict installation of unauthorized Android applications and monitor for suspicious behaviors indicative of the obfuscated Android backdoor. 5) Collaborate with financial app developers to identify and patch vulnerabilities that ERMAC exploits for form injection. 6) Leverage the leaked source code insights to develop custom detection signatures and disrupt malware infrastructure by exploiting the hardcoded credentials and default tokens. 7) Educate users on phishing and social engineering tactics to reduce initial infection vectors. 8) Establish incident response playbooks specific to banking trojan infections to minimize impact and recovery time.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://hunt.io/blog/ermac-v3-banking-trojan-source-code-leak"]
Adversary
ERMAC
Pulse Id
689ec5b0e65be6f6469fc2f8
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash175d4adc5fc0b0d8eb4b7d93b6f9694e4a3089e4ed4c59a2828d0667a9992aaa
hash8c81cebbaff9c9cdad69257f50af0f5208a0d5923659b4e0c3319333f9e8d545

Ip

ValueDescriptionCopy
ip121.127.231.161
ip121.127.231.163
ip121.127.231.198
ip206.123.128.81
ip5.188.33.192
ip91.92.46.12

Threat ID: 689f2c73ad5a09ad006c9dc2

Added to database: 8/15/2025, 12:47:47 PM

Last enriched: 8/15/2025, 1:03:23 PM

Last updated: 8/16/2025, 12:32:39 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats