Analysis
-
max time kernel
149s -
max time network
157s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
17-01-2025 22:00
Static task
static1
Behavioral task
behavioral1
Sample
97cf1cb3030e137b284d78392267ee56ca539c5f4ce131b90c4856b4850b6c06.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
97cf1cb3030e137b284d78392267ee56ca539c5f4ce131b90c4856b4850b6c06.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
97cf1cb3030e137b284d78392267ee56ca539c5f4ce131b90c4856b4850b6c06.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
97cf1cb3030e137b284d78392267ee56ca539c5f4ce131b90c4856b4850b6c06.apk
-
Size
5.0MB
-
MD5
f9100a33abc074cc31d60cb9d704a3f8
-
SHA1
27f394dbf7c281cdd9e3b7e6ffb6920a765d3888
-
SHA256
97cf1cb3030e137b284d78392267ee56ca539c5f4ce131b90c4856b4850b6c06
-
SHA512
ab01a350090fd0726d838c9cd17b9737861ddad67456dd82603d1304d6f4dacf0c661e784cb2c113e51f6e72b461da5a096e8cb1d9317b163e7d3e6964c5241f
-
SSDEEP
98304:s+PQMWLqGsYk47P8OQQ4T18yXqnu1vEPMfCwDYmwiG5/RsqalAz:BP+3RDhQxxanu1YUNO/RuS
Malware Config
Extracted
hook
http://154.216.17.69
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.dowveeojo.jwecwulpd/app_dex/classes.dex 5054 com.dowveeojo.jwecwulpd /data/user/0/com.dowveeojo.jwecwulpd/app_dex/classes.dex 5054 com.dowveeojo.jwecwulpd -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.dowveeojo.jwecwulpd Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.dowveeojo.jwecwulpd Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.dowveeojo.jwecwulpd -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.dowveeojo.jwecwulpd -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.dowveeojo.jwecwulpd -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.dowveeojo.jwecwulpd -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.dowveeojo.jwecwulpd -
Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.dowveeojo.jwecwulpd android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.dowveeojo.jwecwulpd android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.dowveeojo.jwecwulpd android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.dowveeojo.jwecwulpd android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.dowveeojo.jwecwulpd android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.dowveeojo.jwecwulpd android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.dowveeojo.jwecwulpd android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.dowveeojo.jwecwulpd -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.dowveeojo.jwecwulpd -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.dowveeojo.jwecwulpd -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.dowveeojo.jwecwulpd -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.dowveeojo.jwecwulpd -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.dowveeojo.jwecwulpd -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.dowveeojo.jwecwulpd -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.dowveeojo.jwecwulpd
Processes
-
com.dowveeojo.jwecwulpd1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:5054
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5acae17194e1e3af1d4a8d8ca4d2c7f6a
SHA116b3dee5fbbd07589a946f946caf6ac7edbabdb6
SHA2568632c60947ea443f7b19f1c7226c8e354d587b374ce358cd3713198f11bf113a
SHA512be96fc9e82bcdd9c7ccffdebddf53f93279d063599b37bf950e514ae4de331e6dd8823f7703fabaf35d16e5cf44cf0d787dbe24e66b5dbacaa77f067f6581b7c
-
Filesize
1.0MB
MD576bdb6d7ea1386b32382ee2a3e237f43
SHA128dba808ca9257dee6bdaf55f052758a53b4e8e3
SHA256ef2b45a7c8d9ac6cd61b7ac4886f2a8568a4d4f9a44b9260790d21357e7da74d
SHA5126c861919e901a6b54f4a3a9e0a93a9f717682e81cbbc130f300e13f6b2d3258e7e87e9ddce505c08bf8f3b1cf0f55006f13be61a4fb7cd312bf0b4f43cca52c3
-
Filesize
1.0MB
MD52db8acfe4fe8558b4c151bff101e4606
SHA1a772d781bbfc4c1698513b1b837e84821ac1d09c
SHA25619c414337f416bd0ff418d7c745b685bde7b5567bef151dfbcd130f3e1b81644
SHA512a2d49addfac9b67717a44f812d80542f21fd612aafec1c015437b5d1cdd4b8c6b73f6f2944b36b52e954edbd9991ea48d9fde91166ffe338537c666207000bac
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5efa93e0acb76269d1839e0c4f6fa4e1b
SHA171839edeb01aaa2ae5c1b597c5f37c3214c4680c
SHA25678f0b25742eda2c454cbf75e4fda3714d31b458217ecc5d090aee6feb067ebb7
SHA5129dc5355f284ff8dec721c23c4f85e45877cb82315a80a1fa49bc17af1f3ea26794cfca4d3e0e0aee5aae4288dc52364fb83f11fcef1add6d1bbadcaf89c88dd7
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5b9fe5d12deeb892a23f564deb43fc66f
SHA1063fb62928697ade50f9d1ebfd1b20b43eb1d436
SHA256ab416c60fcdcc9fae9a52893216f79c1a220b7cabcf409e3676d0b287a67a439
SHA5123a65f670f1716fbe952b93fa6bac00151314d4cc8786e92a9944f4fea3d42cc8cc6a2d8402feb5ded0b83544958fe8d6e3e9eafb036a9470581886f1375d3146
-
Filesize
108KB
MD51c59fded6b89ee3ffc73dbd7809cf633
SHA13544d7dfd61165e167edf922034f14a32318a183
SHA25694691e96631655d5fe8c51a527520259fc33c593142498aa98286b9fb3c23acd
SHA51213b44f546fa0a957b26a88c0bddb36a9ff79a36ff2ca9d714218a595e28549afa4fad772172b7fd8c8a42400eee337b19282dcac83ca1562b0706db503b47e28
-
Filesize
173KB
MD52ac25446456838c46a19b55a6a0c11de
SHA1d4c6b1fd8604dac236eda6004445ae74f530687e
SHA256c8e4e450c740e5ef5bccd0397dfb3fd812fe0859d2737423a691c7fa9c754e8c
SHA512afb26b704780adeaa6e5c5deb53e438ee8f51559a4a613d4856a3a6288e4ac08e9dc63baf233532d2569fa70f524002ea15cb4b0935be0aaa43ae619d589db7f