Analysis
-
max time kernel
149s -
max time network
151s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
07/04/2025, 12:28
Behavioral task
behavioral1
Sample
6a281f0d17b9260cd4060bc39a6d098b489d3e6c.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
6a281f0d17b9260cd4060bc39a6d098b489d3e6c.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
6a281f0d17b9260cd4060bc39a6d098b489d3e6c.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
6a281f0d17b9260cd4060bc39a6d098b489d3e6c.apk
-
Size
1.1MB
-
MD5
e380822a814c12db6f82f705298f44fb
-
SHA1
6a281f0d17b9260cd4060bc39a6d098b489d3e6c
-
SHA256
14686cea935b7ac1dbcf314a574f50f2569d08d2d5909faaae5357041295d954
-
SHA512
076847dc828325f6471a927c2615d31cc2d919f0946ca4438f60f851b0a16fd7ec9d10632cc632770b9aeb7b39bf0470998668a41567cb3dcedd57726aae2297
-
SSDEEP
24576:etLdG7RLtliQ4KfVo0lK5OGws4/ojydIg/MigO:ejG7Rp0xKfGi/XdIg/MO
Malware Config
Extracted
hook
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.lawivehelowu.vezino Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.lawivehelowu.vezino Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.lawivehelowu.vezino -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.lawivehelowu.vezino -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.lawivehelowu.vezino -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.lawivehelowu.vezino -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.lawivehelowu.vezino -
Performs UI accessibility actions on behalf of the user 1 TTPs 6 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.lawivehelowu.vezino android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.lawivehelowu.vezino android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.lawivehelowu.vezino android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.lawivehelowu.vezino android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.lawivehelowu.vezino android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.lawivehelowu.vezino -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.lawivehelowu.vezino -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.lawivehelowu.vezino -
Reads information about phone network operator. 1 TTPs
-
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS com.lawivehelowu.vezino -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.lawivehelowu.vezino -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.lawivehelowu.vezino -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.lawivehelowu.vezino -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.lawivehelowu.vezino
Processes
-
com.lawivehelowu.vezino1⤵
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Requests enabling of the accessibility settings.
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4621
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD5ab8d8050234f08f22a405e6ed43fdb0e
SHA1c153c5ed73cadf526a9dacd0230af00df2c486c6
SHA2562c64d5acd16033f8a8e288a2dee2f1d4acf0eced3e813b481fb26f1319e44cce
SHA512ee761b383830baceee58a5d3048eae220629f77396e433e4cae7df6813ce943bfff094ce13f8050812506dbca31a5728770891eaf46bf264515575eb6e24f3b5
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD53ccf2cfce2fd918f04e3ec2dd1a2ab2d
SHA12d221f1b6bcf7b0d2d8abf3cec4e3baba34b1b09
SHA2569b79ef88ee543f3d744e2f5a0a7fbec03cce5beeca9762069e783d4506b3b974
SHA5122021b9911bc5017b03b5943f84f5840b437c03563ec2c53abecbda1f783cecb57ddace095404aeb929a98f401bff3ed57627cc58d4140ea2725d2a58f256ea71
-
Filesize
108KB
MD5b4719222f07b91fee709b379b97689ff
SHA119988cefd3ff45fc5f30e8f1c12dc1ad260625bf
SHA25648379e306ffe3100ca136a339aaa4761cb09de31ff57e8d65cb5725f5fe138ec
SHA512a8fc9a667fd600fd6a8f2335435c9dee883aa10c3ee6c64e3f790ddb3cf748c6f6428b09ab9380e1b75b178476729e35d29b622172653fe9da99325c6a6a1adf
-
Filesize
173KB
MD50f54c54abd48aa3553fc7adbf6151e36
SHA15fb92329d4a142eb1d0168f29c777c09264a96f3
SHA256af5d2c851b625be447104cc1dcbb6e2d99f27ca0f17327a8aa319733fe8e2cd8
SHA512e161bd3d35b85f20894325b352a7a1417c0abb657335611b12df1de9e07255cbe6875b8c24ffd7a2448485345869ac19e6746c36db32edf4ac79737f5708281c