Analysis

  • max time kernel
    35s
  • max time network
    154s
  • platform
    android_x86
  • resource
    android-x86-arm-20240221-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240221-enlocale:en-usos:android-9-x86system
  • submitted
    03-05-2024 01:42

General

  • Target

    341c5b8d7fda09706c39fdb959897e9a983f25bb06cfa9b1a96fbfe54854086a.apk

  • Size

    2.8MB

  • MD5

    d4ae2fca2e9b926ed00e143fe82d5a7a

  • SHA1

    ec1adaff7cce6ad44a1ceea7b8e570b4a30e80cc

  • SHA256

    341c5b8d7fda09706c39fdb959897e9a983f25bb06cfa9b1a96fbfe54854086a

  • SHA512

    6b64668d1ce3cb2ed7642198300370b9ca91cd4df63add599b5202f798924a1b8d8c380408e7096ba8088ec544ae64be0a5a3ebc4da12cc5fe451a4c52303106

  • SSDEEP

    49152:VOzC9Y6YLY4KyrS7sHiV38ZyMf4fgxIIg9nqMUN3OmAtDdZnHIo/kKLg/VQ:VhY6YLYCrMbtaAfgxlg9nqMUZMZ5kbQ

Malware Config

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Prevents application removal 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to prevent removal.

  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Requests enabling of the accessibility settings. 1 IoCs
  • Acquires the wake lock 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

Processes

  • com.weruzepufalo.mavimibe
    1⤵
    • Makes use of the framework's Accessibility service
    • Prevents application removal
    • Makes use of the framework's foreground persistence service
    • Queries information about running processes on the device
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Requests enabling of the accessibility settings.
    • Acquires the wake lock
    • Schedules tasks to execute at a specified time
    PID:4466

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.weruzepufalo.mavimibe/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.weruzepufalo.mavimibe/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    8fc20988b6eef4ffc4acfc0f614aed8d

    SHA1

    be9d4caf403ba70ca5d8a340fa55a03a86342709

    SHA256

    283140401ba1d847a3eb62d1f65d1b890d7b8e49dac46a96b308246d5ed7e460

    SHA512

    6cb07dc48907ac2759b7f209b28a76f64764a6259394f942f0963fd4617497caca64b93ae22360d69d2f66446f2830d24b2b59ea7b6e5a05af6cbd4c3298e716

  • /data/data/com.weruzepufalo.mavimibe/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.weruzepufalo.mavimibe/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    62fc3a5c3f13231bb6f87d54f4d19dda

    SHA1

    10a13a21c5ef76b3b03845061eb43a2ba2e19ab2

    SHA256

    001ec048a66ccedfe644da474af0f171583013b276094b0055af5f76b4b1e404

    SHA512

    20c607f8f8ff9929b965ce56b96744e94d11208f63a834721f0e3828dca2927695328b91811c910d6e6df25ea9e4f536e1e3c29c11ac7983ed3eacce9ce3b55f

  • /data/data/com.weruzepufalo.mavimibe/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    dc0ffa4540d01dfcc41e4afb9221394a

    SHA1

    d40b2af5541778da5d7985a4166d0e45f41a1bfb

    SHA256

    752fb5a74b546b9485e724257522dae1c31d7ef7fc47f75ed7bf0f38052ce61a

    SHA512

    f3e4eaa94ea1beeef57763ae7b7d2b1603151219a269f21878d71e4123f92f12db1b815a1a0f5239a4718e2ccddcb962707b78745e5d931f4dbd07ba97abbe4f

  • /data/data/com.weruzepufalo.mavimibe/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    6687b8d0a785b3cc091589764b21ff9f

    SHA1

    ea9114f23177d682166a3574d6a9e23c94e415d2

    SHA256

    7569e18044985d6ad16d707e511b4c66594a681e103635385d34888e5224114c

    SHA512

    0878d104c5259b06f7f27eac0971f0c90441b21c243ad72b43065b4bf29f902a29f0a40c4edfccdcfdca5e6b4c434781c71b347e65172827f3543ebaf82434b0