Analysis
-
max time kernel
150s -
max time network
130s -
platform
android_x86 -
resource
android-x86-arm-20240221-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240221-enlocale:en-usos:android-9-x86system -
submitted
02-05-2024 00:40
Behavioral task
behavioral1
Sample
d4ae2fca2e9b926ed00e143fe82d5a7a.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
d4ae2fca2e9b926ed00e143fe82d5a7a.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
d4ae2fca2e9b926ed00e143fe82d5a7a.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
d4ae2fca2e9b926ed00e143fe82d5a7a.apk
-
Size
2.8MB
-
MD5
d4ae2fca2e9b926ed00e143fe82d5a7a
-
SHA1
ec1adaff7cce6ad44a1ceea7b8e570b4a30e80cc
-
SHA256
341c5b8d7fda09706c39fdb959897e9a983f25bb06cfa9b1a96fbfe54854086a
-
SHA512
6b64668d1ce3cb2ed7642198300370b9ca91cd4df63add599b5202f798924a1b8d8c380408e7096ba8088ec544ae64be0a5a3ebc4da12cc5fe451a4c52303106
-
SSDEEP
49152:VOzC9Y6YLY4KyrS7sHiV38ZyMf4fgxIIg9nqMUN3OmAtDdZnHIo/kKLg/VQ:VhY6YLYCrMbtaAfgxlg9nqMUZMZ5kbQ
Malware Config
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.weruzepufalo.mavimibe Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.weruzepufalo.mavimibe Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.weruzepufalo.mavimibe -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.weruzepufalo.mavimibe -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.weruzepufalo.mavimibe -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.weruzepufalo.mavimibe -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.weruzepufalo.mavimibe -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.weruzepufalo.mavimibe -
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS com.weruzepufalo.mavimibe -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.weruzepufalo.mavimibe -
Reads information about phone network operator. 1 TTPs
Processes
-
com.weruzepufalo.mavimibe1⤵
- Makes use of the framework's Accessibility service
- Makes use of the framework's foreground persistence service
- Queries information about running processes on the device
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Requests enabling of the accessibility settings.
- Acquires the wake lock
PID:4236
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Discovery
Process Discovery
1System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD556eb039e48bd7b46f6087a7f9c144a6f
SHA1cc3f91cf168bc8b85875c29a5b120f165c80888c
SHA256a729d9b4055ee95bf26b7838f963fe1e0a94cbecfeb06ac23e6b65e8d9a7f457
SHA51204f6a535d8c07dd508d16ff8abb1b46a85de93fdf3b70d6c0a910b343ed604308a63d7559a1fafcec976fcfc8c7e946d000c580aba643ec708864fa1f2dbd138
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5005af1388314252975611b7ef88c181f
SHA169b7df046011016c7fc493a0d3efeca0728e1102
SHA2568e4587c88624ce0ae982ca0fde35f675580c38999a3e2e1e939b4298f46011af
SHA512b7e3e6d77cefcdd9674d2b0c3b65fd485da5b93734774054a888d2d308cdc77342eeba9b91bf6dc7b6d6aa1c7f758c71632e864344b676181a3786aa3ae1cadf
-
Filesize
108KB
MD5f9a839ebf24ceda1a805d5e319929449
SHA168fb138aa58fdb6d68d68ddfaf2deb87d4f4137d
SHA25660f4c1ff2bc5f05ac9aef7d41806ab6cf77042a19c888a5ab82714610a6b8cb8
SHA5126f080cacd7335621e6483eb64cc4bb41a8f510f94de96c926f4c8c2f8c55b01db8c4160bb01847fbdc215554a137a1ff3f309280dc727f9e2fb66a760ab9d48f
-
Filesize
173KB
MD554c49e03beebd661a283f21a9fd8e296
SHA1d5776a6df894673def977556db784ab397782a78
SHA2569c2925634fc0c209f363657aed51077906c093a9918bf331c13a5e097708f277
SHA5123674269876038dab8a43133c8acd5233cae9193af9c3dcf772cc63642c9086c2310357f685a24b4ca1a7d09fa75d9b82caec1d5bf1784e7a326d0860427f718c