Analysis
-
max time kernel
179s -
max time network
184s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
02-07-2024 22:01
Behavioral task
behavioral1
Sample
4149e4a3434c44a87f55b5643d5bbbd55e093dc592a600be679aae9dd3706897.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
4149e4a3434c44a87f55b5643d5bbbd55e093dc592a600be679aae9dd3706897.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
4149e4a3434c44a87f55b5643d5bbbd55e093dc592a600be679aae9dd3706897.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
4149e4a3434c44a87f55b5643d5bbbd55e093dc592a600be679aae9dd3706897.apk
-
Size
3.5MB
-
MD5
d097ba2ec6c71d7f0118cb3bb11f89bd
-
SHA1
d3310070f7f5065f218851b5445c7034a382600b
-
SHA256
4149e4a3434c44a87f55b5643d5bbbd55e093dc592a600be679aae9dd3706897
-
SHA512
d0a54a35b36b736aa55ddd23d8a53b1a8bfab08b290c8accd527f7c4993439496d72d785b68767c15570ebb5e137485320098d548db14cc54bfd38ad298c39ca
-
SSDEEP
49152:r+LlX/wLODvIv6CxceAWbN1k55gQVxF5HaH8Ib/iVhT6+cfsiJTDMQGNgEJWzJSu:r+LlvQSqrN1yXF56cnl6+/ihDYPbS6c
Malware Config
Extracted
hook
http://192.168.10.24:3434
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
pid Process 4317 com.fogipexosisa.wesoku 4317 com.fogipexosisa.wesoku -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.fogipexosisa.wesoku Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.fogipexosisa.wesoku Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.fogipexosisa.wesoku -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.fogipexosisa.wesoku -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.fogipexosisa.wesoku -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.fogipexosisa.wesoku -
Performs UI accessibility actions on behalf of the user 1 TTPs 15 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fogipexosisa.wesoku android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fogipexosisa.wesoku android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fogipexosisa.wesoku android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fogipexosisa.wesoku android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fogipexosisa.wesoku android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fogipexosisa.wesoku android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fogipexosisa.wesoku android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fogipexosisa.wesoku android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fogipexosisa.wesoku android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fogipexosisa.wesoku android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fogipexosisa.wesoku android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fogipexosisa.wesoku android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fogipexosisa.wesoku android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fogipexosisa.wesoku android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fogipexosisa.wesoku -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.fogipexosisa.wesoku -
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.fogipexosisa.wesoku -
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS com.fogipexosisa.wesoku -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.fogipexosisa.wesoku -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.fogipexosisa.wesoku -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.fogipexosisa.wesoku
Processes
-
com.fogipexosisa.wesoku1⤵
- Removes its main activity from the application launcher
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests enabling of the accessibility settings.
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4317
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Process Discovery
1System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5ad20201191c95145e8f867a7680ad59c
SHA147ba272d9de5eb7aa2391d52d813bac1a0760094
SHA25689747aafccf7e5b45d60b37135ac591f7c1a018e5f7dd13f2046851ab8a1d799
SHA51278854cb5b13f70c1659307e3bbc11fb4c4d38d01490b497c137a472255305fb0c6a1837286c74fcbe4c7f19cc249e2a2305dc4262bf15ed208e250b8b122a482
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5f5186a5c5ffc360bdb637be1106866f4
SHA1d1f3f337e0276598d1fa08e62d360de3a99424f3
SHA256d4a0ac52c24ff7cd783415079c2215d43550f549e636b21d0ee11bf0ff82620d
SHA512bc1240c07990f3637d8b5875039f71a5bc403d6b0de76a9607b2ef5e6347458725068cc6c002f3cc7ccc66cba595ce78201c8809ecc0209df5d438786e859040
-
Filesize
108KB
MD5141d8f831b1aef5b1ea3694d615976ca
SHA164a63d0cb4c97cb8ff310a3e5af190ef1787be66
SHA2567340494b7b88287f3b63b3c2e512aedd473e7021c9b01986c0e9f1c8ae75e59d
SHA512f9fa959915177b9cec55b858595818501d23707508daa16b52a01194f7607b21b7c8c24caf2392d43068e5eda5cb629b3290d3e8017f2d40d87900a99f63e982
-
Filesize
173KB
MD53b069a88aca9a9604ec03eafad2e965e
SHA1eb0beb20ba60ed7caca2383243ef9dcf5f914abd
SHA25663b4ae0572f645da32838c1416a45e1e4fc2fedeb2080a03b85a5e53a32e3a25
SHA5127b8338300fef1f6277a5673ce559a798405464832a347362558d76a1b847a797e7533bfc13453aa3edf368c73fce5eca11bfd307e76f2fe6a9d511e56594865f