Analysis
-
max time kernel
35s -
max time network
154s -
platform
android_x86 -
resource
android-x86-arm-20240221-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240221-enlocale:en-usos:android-9-x86system -
submitted
03-05-2024 01:42
Behavioral task
behavioral1
Sample
341c5b8d7fda09706c39fdb959897e9a983f25bb06cfa9b1a96fbfe54854086a.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
341c5b8d7fda09706c39fdb959897e9a983f25bb06cfa9b1a96fbfe54854086a.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
341c5b8d7fda09706c39fdb959897e9a983f25bb06cfa9b1a96fbfe54854086a.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
341c5b8d7fda09706c39fdb959897e9a983f25bb06cfa9b1a96fbfe54854086a.apk
-
Size
2.8MB
-
MD5
d4ae2fca2e9b926ed00e143fe82d5a7a
-
SHA1
ec1adaff7cce6ad44a1ceea7b8e570b4a30e80cc
-
SHA256
341c5b8d7fda09706c39fdb959897e9a983f25bb06cfa9b1a96fbfe54854086a
-
SHA512
6b64668d1ce3cb2ed7642198300370b9ca91cd4df63add599b5202f798924a1b8d8c380408e7096ba8088ec544ae64be0a5a3ebc4da12cc5fe451a4c52303106
-
SSDEEP
49152:VOzC9Y6YLY4KyrS7sHiV38ZyMf4fgxIIg9nqMUN3OmAtDdZnHIo/kKLg/VQ:VhY6YLYCrMbtaAfgxlg9nqMUZMZ5kbQ
Malware Config
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.weruzepufalo.mavimibe Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.weruzepufalo.mavimibe Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.weruzepufalo.mavimibe -
Prevents application removal 1 TTPs 1 IoCs
Application may abuse the framework's APIs to prevent removal.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.weruzepufalo.mavimibe -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.weruzepufalo.mavimibe -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.weruzepufalo.mavimibe -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.weruzepufalo.mavimibe -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.weruzepufalo.mavimibe -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.weruzepufalo.mavimibe -
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS com.weruzepufalo.mavimibe -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.weruzepufalo.mavimibe -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.weruzepufalo.mavimibe
Processes
-
com.weruzepufalo.mavimibe1⤵
- Makes use of the framework's Accessibility service
- Prevents application removal
- Makes use of the framework's foreground persistence service
- Queries information about running processes on the device
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Requests enabling of the accessibility settings.
- Acquires the wake lock
- Schedules tasks to execute at a specified time
PID:4466
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Process Discovery
1System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD58fc20988b6eef4ffc4acfc0f614aed8d
SHA1be9d4caf403ba70ca5d8a340fa55a03a86342709
SHA256283140401ba1d847a3eb62d1f65d1b890d7b8e49dac46a96b308246d5ed7e460
SHA5126cb07dc48907ac2759b7f209b28a76f64764a6259394f942f0963fd4617497caca64b93ae22360d69d2f66446f2830d24b2b59ea7b6e5a05af6cbd4c3298e716
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD562fc3a5c3f13231bb6f87d54f4d19dda
SHA110a13a21c5ef76b3b03845061eb43a2ba2e19ab2
SHA256001ec048a66ccedfe644da474af0f171583013b276094b0055af5f76b4b1e404
SHA51220c607f8f8ff9929b965ce56b96744e94d11208f63a834721f0e3828dca2927695328b91811c910d6e6df25ea9e4f536e1e3c29c11ac7983ed3eacce9ce3b55f
-
Filesize
108KB
MD5dc0ffa4540d01dfcc41e4afb9221394a
SHA1d40b2af5541778da5d7985a4166d0e45f41a1bfb
SHA256752fb5a74b546b9485e724257522dae1c31d7ef7fc47f75ed7bf0f38052ce61a
SHA512f3e4eaa94ea1beeef57763ae7b7d2b1603151219a269f21878d71e4123f92f12db1b815a1a0f5239a4718e2ccddcb962707b78745e5d931f4dbd07ba97abbe4f
-
Filesize
173KB
MD56687b8d0a785b3cc091589764b21ff9f
SHA1ea9114f23177d682166a3574d6a9e23c94e415d2
SHA2567569e18044985d6ad16d707e511b4c66594a681e103635385d34888e5224114c
SHA5120878d104c5259b06f7f27eac0971f0c90441b21c243ad72b43065b4bf29f902a29f0a40c4edfccdcfdca5e6b4c434781c71b347e65172827f3543ebaf82434b0