Analysis

  • max time kernel
    151s
  • max time network
    135s
  • platform
    android_x64
  • resource
    android-x64-20240221-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system
  • submitted
    03-05-2024 01:42

General

  • Target

    341c5b8d7fda09706c39fdb959897e9a983f25bb06cfa9b1a96fbfe54854086a.apk

  • Size

    2.8MB

  • MD5

    d4ae2fca2e9b926ed00e143fe82d5a7a

  • SHA1

    ec1adaff7cce6ad44a1ceea7b8e570b4a30e80cc

  • SHA256

    341c5b8d7fda09706c39fdb959897e9a983f25bb06cfa9b1a96fbfe54854086a

  • SHA512

    6b64668d1ce3cb2ed7642198300370b9ca91cd4df63add599b5202f798924a1b8d8c380408e7096ba8088ec544ae64be0a5a3ebc4da12cc5fe451a4c52303106

  • SSDEEP

    49152:VOzC9Y6YLY4KyrS7sHiV38ZyMf4fgxIIg9nqMUN3OmAtDdZnHIo/kKLg/VQ:VhY6YLYCrMbtaAfgxlg9nqMUZMZ5kbQ

Malware Config

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Prevents application removal 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to prevent removal.

  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Acquires the wake lock 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

Processes

  • com.weruzepufalo.mavimibe
    1⤵
    • Makes use of the framework's Accessibility service
    • Prevents application removal
    • Makes use of the framework's foreground persistence service
    • Queries information about running processes on the device
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Acquires the wake lock
    • Schedules tasks to execute at a specified time
    PID:5048

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.weruzepufalo.mavimibe/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.weruzepufalo.mavimibe/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    8f21f6aabb40f9d442b12756b3d719cd

    SHA1

    aff8be670c1843501e470640bbb27beabab7938f

    SHA256

    f412eb099d5a9d37c0b2de55df57ad31e189ecea907e351d589753873d4d7139

    SHA512

    45c64f5cf09ac2a6a7e4d064dfa0dc998a6eadb13426341b5e1713b6a291a663a154c317c260a4b7094ab54aca975a9bf2962e88992b7365644428d7bffaca26

  • /data/data/com.weruzepufalo.mavimibe/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.weruzepufalo.mavimibe/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    fb4642797a76757d2deb5b897f3ace04

    SHA1

    150c5feec83bd13b5b37b540feabfe2bde1e5a87

    SHA256

    84d050fd9ea07151c1df07af8a7c9849246c08f42fb712f9187cfcd48cdb2306

    SHA512

    6854bf59be5e2a7783c5b234d665d719ee7d9cb501a0285d5ca963d025054e0fef3ed79f13b6db1711f2a4de8dfa437802b4dcbec789e7e9a7dd55406ade4981

  • /data/data/com.weruzepufalo.mavimibe/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    8f55e549a469c8fba1c635b21fab2105

    SHA1

    2a2e7f62c0c03d90f2f844e711a600c297d2dccf

    SHA256

    f8203551050cd3b9518cc841a8cfeef2e5885c96a5e6e7880463dc0d02cfd1b2

    SHA512

    ec3aa696064a70c3ad325c13f0d66e67cf0f5a63a12c1a3911de0783df52410c2d146bdda1c0a6351041a4cbccecf00bc550a6ba0e7973c376ce902c800841c3

  • /data/data/com.weruzepufalo.mavimibe/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    f80f82599110762103020a2a1182f85c

    SHA1

    c5e741239d15573a23bca5bdcb6f2733fefcbd8b

    SHA256

    765e125c192f9665311925aa5ab333d11faf02abca9d2c876b23ecae63b1fa31

    SHA512

    1b8311b47ce0a795dd0ef162a35595372e2d2f0a063ffa83a9c5ac4f369a2c24cc0183e082981f23147b96a387d939ff65921aeb3abbfce679cac96e32d3660f