Analysis

  • max time kernel
    179s
  • max time network
    150s
  • platform
    android_x64
  • resource
    android-33-x64-arm64-20240624-en
  • resource tags

    androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system
  • submitted
    07-08-2024 22:07

General

  • Target

    be5bd169d4950913786029686376143cd836e24019eb845521eecbdd5862123e.apk

  • Size

    207KB

  • MD5

    04d95986c1ef12cca9c31dc2668056fb

  • SHA1

    eb325e6bbbd70f266234ad8cdb279546009437d1

  • SHA256

    be5bd169d4950913786029686376143cd836e24019eb845521eecbdd5862123e

  • SHA512

    105a9dea2c9956ca0187c2651625138595cde36474f19a8a90e21229e3b467ba566ff67276cf9d75e8264900ee825eb7d463f742d5c90bab140b82a4bd65e3fe

  • SSDEEP

    6144:tMN9FFN4LKFUhzF17N0XGo+oruJhX61Ln3nm8lhle2gfA8:tMN994LKyhXZ0XGoBqLSm8lhle2l8

Malware Config

Signatures

Processes

  • x.abply.dnxssu
    1⤵
    • Checks if the Android device is rooted.
    • Loads dropped Dex/Jar
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Requests changing the default SMS application.
    PID:4338

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/x.abply.dnxssu/files/dex

    Filesize

    446KB

    MD5

    a5c03847adaa5cfc2a89b612c5e7109d

    SHA1

    68b56e1996cb8a191900bb56c858d8c295e83637

    SHA256

    de166f7a253172ab55334dbc81bcfcf8d04e924ea3d261375653d86936c699d5

    SHA512

    f8326dbc3d66bc5b8519be5c5d1a1b02c4e2188a530d9019c1350b1c035ea9143c3528709c4a53230ecafc1e7241ea0bd7203f4013acd47a411415f64117bc97