Analysis

  • max time kernel
    179s
  • max time network
    132s
  • platform
    android_x64
  • resource
    android-33-x64-arm64-20240611.1-en
  • resource tags

    androidarch:arm64arch:x64image:android-33-x64-arm64-20240611.1-enlocale:en-usos:android-13-x64system
  • submitted
    17-06-2024 12:26

General

  • Target

    WhatsApp.apk

  • Size

    786KB

  • MD5

    572589492cf56c19140b0f35e5205dbd

  • SHA1

    8fb0fe21bb0f3ee43702167c5b57f76397882264

  • SHA256

    8a91bf9ba1250e5f0977384101f5ff3c1d7dc121e7ed304e2580bac1082b7d61

  • SHA512

    ef08cf54f52b21826cddb9c1784c667471851687a14c907786b9df21201df27dc9f830555c8d55dda2c2b0249bd2e1e88d4552cd53e503ab75838b97c3399101

  • SSDEEP

    12288:QLcfa1a8Lzezw+8RB/lwlW75WmpYshXZPbGwidNpgY:ta1amebkBtwlW75WmD9idNpf

Malware Config

Signatures

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Requests enabling of the accessibility settings. 1 IoCs
  • Tries to add a device administrator. 2 TTPs 1 IoCs

Processes

  • cmf0.c3b5bm90zq.patch
    1⤵
    • Makes use of the framework's foreground persistence service
    • Requests enabling of the accessibility settings.
    • Tries to add a device administrator.
    PID:4326

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /storage/emulated/0/service player/config17-06-2024.log
    Filesize

    39B

    MD5

    dd0429a2a11874170f62282b53815913

    SHA1

    3ba81fa2b856dc78cf94e014f939eb8b8e2964ae

    SHA256

    0eaa454e8ed380f1ec2aac5ee85b33dd281c51a29d23dd3ec25df3569beab4f4

    SHA512

    ec0115ee1621745d6bf83dbab3c1737b54aa98db1efb4876fae9c76dd731db5c6e45a68c4a6fe4ebbf17a6184829029a4cec947b392db7a4a02d98c973358b61