Analysis

  • max time kernel
    178s
  • max time network
    150s
  • platform
    android_x64
  • resource
    android-x64-20240611.1-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240611.1-enlocale:en-usos:android-10-x64system
  • submitted
    17-06-2024 12:26

General

  • Target

    WhatsApp.apk

  • Size

    786KB

  • MD5

    572589492cf56c19140b0f35e5205dbd

  • SHA1

    8fb0fe21bb0f3ee43702167c5b57f76397882264

  • SHA256

    8a91bf9ba1250e5f0977384101f5ff3c1d7dc121e7ed304e2580bac1082b7d61

  • SHA512

    ef08cf54f52b21826cddb9c1784c667471851687a14c907786b9df21201df27dc9f830555c8d55dda2c2b0249bd2e1e88d4552cd53e503ab75838b97c3399101

  • SSDEEP

    12288:QLcfa1a8Lzezw+8RB/lwlW75WmpYshXZPbGwidNpgY:ta1amebkBtwlW75WmD9idNpf

Malware Config

Signatures

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs

Processes

  • cmf0.c3b5bm90zq.patch
    1⤵
    • Makes use of the framework's foreground persistence service
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    PID:5009

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /storage/emulated/0/service player/config17-06-2024.log
    Filesize

    63B

    MD5

    c75ecdc9e8b8da90ed47fa4cd2858f63

    SHA1

    ea66eebc03f74f4852175734f4e6ce66ac4319ff

    SHA256

    cabb5b1ce2c94bd29fa710bd48ad96d97cf2fe90acbc8d40eb4c3b17c94d98e9

    SHA512

    1b9d3a50ed11b85ab029e52d7057d08b316fa68909b2cf11f832fb5d42d46687bcfac86e4b2f148832906efb7c822b0a3484129804f75a72a93525d4900f697a