Analysis
-
max time kernel
124s -
max time network
151s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
06-10-2024 01:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://web.archive.org/web/20230706214541/https://download1587.mediafire.com/t1vdad3xufngg6CCX1k5jtiFJ0YYnHArLuX2ldpUW45Y7C5_ICaaMoj15-uYrQ6IH4D6uZD0Xn-dcHnvDAXCw1fpmTc_0gQtEgldscAvESOiKjQXCpk1VPUISW0N9EJwVOMwZfG74yKr06krisXQH9u4s95Hp7LFqY-oMYQYAG2yBcY/12o45hf43lvv6az/fnaf2+aptoide.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
https://web.archive.org/web/20230706214541/https://download1587.mediafire.com/t1vdad3xufngg6CCX1k5jtiFJ0YYnHArLuX2ldpUW45Y7C5_ICaaMoj15-uYrQ6IH4D6uZD0Xn-dcHnvDAXCw1fpmTc_0gQtEgldscAvESOiKjQXCpk1VPUISW0N9EJwVOMwZfG74yKr06krisXQH9u4s95Hp7LFqY-oMYQYAG2yBcY/12o45hf43lvv6az/fnaf2+aptoide.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
https://web.archive.org/web/20230706214541/https://download1587.mediafire.com/t1vdad3xufngg6CCX1k5jtiFJ0YYnHArLuX2ldpUW45Y7C5_ICaaMoj15-uYrQ6IH4D6uZD0Xn-dcHnvDAXCw1fpmTc_0gQtEgldscAvESOiKjQXCpk1VPUISW0N9EJwVOMwZfG74yKr06krisXQH9u4s95Hp7LFqY-oMYQYAG2yBcY/12o45hf43lvv6az/fnaf2+aptoide.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
https://web.archive.org/web/20230706214541/https://download1587.mediafire.com/t1vdad3xufngg6CCX1k5jtiFJ0YYnHArLuX2ldpUW45Y7C5_ICaaMoj15-uYrQ6IH4D6uZD0Xn-dcHnvDAXCw1fpmTc_0gQtEgldscAvESOiKjQXCpk1VPUISW0N9EJwVOMwZfG74yKr06krisXQH9u4s95Hp7LFqY-oMYQYAG2yBcY/12o45hf43lvv6az/fnaf2+aptoide.apk
Malware Config
Signatures
-
Wipelock
Wipelock is an Android trojan with multiple capabilities, such as wiping data, reading and sending SMS messages without the victim's knowledge.
-
Wipelock Android payload 1 IoCs
Processes:
resource yara_rule /storage/emulated/0/Download/.pending-1728781578-fnaf2 aptoide.apk family_wipelock -
Declares broadcast receivers with permission to handle system events 1 IoCs
Processes:
description ioc Required by device admin receivers to bind with the system. Allows apps to manage device administration features. android.permission.BIND_DEVICE_ADMIN -
Requests dangerous framework permissions 8 IoCs
Processes:
description ioc Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE Allows an application to receive SMS messages. android.permission.RECEIVE_SMS Allows an application to send SMS messages. android.permission.SEND_SMS Allows an application to read SMS messages. android.permission.READ_SMS Allows an application to read the user's contacts data. android.permission.READ_CONTACTS Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.android.chromedescription ioc process File opened for read /proc/cpuinfo com.android.chrome -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.android.chromedescription ioc process File opened for read /proc/meminfo com.android.chrome
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5ff3b1591e700362ae0e58bc6cd49ef1a
SHA14f54434e3fdf6a2f6a4181ced3588fe76473f6d6
SHA256193d61f52970c99272c14938226c9b0d7012a0655da48f0ce7903a4bb12f8562
SHA5127006a3d1336d7c17849421fda9b77dc624ac36e031cacaf0f856c020a8bab055d7627654dae95bee291d8bd5f1efc5be5fd15f18b30afb439d74ae8bc4a4f18b
-
Filesize
549KB
MD562da81e2b3814236196861ed2ca4f692
SHA1f81a7a2efed6198303a4511436990be0f8391600
SHA2569e1e505ef22e17bff8bc272045278703da6bd6583b4ae0e5dc5de75203bebe8e
SHA512a673d2d9bc3b455cee18e1925c3137d22eef7ee4e8bf25de05404b9c5c605eee9edd6488d524e4969689236fc7278179f3e344bc8c46078cb0c7c0d33a0485c4
-
Filesize
525KB
MD5d2a5a564f6e6f810e0df34b36099a2df
SHA17a138b8385cf84f87a749f994c5f84492c00a209
SHA2562fd5e4f63c1cbded025d7be39b3ccd5fff237c8f1615f8b3b6db2a7ff9a06d79
SHA512aa5275a321fa90ae868bd69ceead9d018e517912fed57a9136971b01cc85b8e6e919feedc22674caba4d485906970f0a39bf20bbc02ffc569aef6be3e2e1c194