Analysis
-
max time kernel
37s -
max time network
77s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
07-08-2024 19:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://freerobux.en.uptodown.com/android
Resource
android-x64-arm64-20240624-en
General
-
Target
https://freerobux.en.uptodown.com/android
Malware Config
Signatures
-
Android SMSWorm payload 1 IoCs
resource yara_rule behavioral1/files/fstream-5.dat family_smsworm -
SMSWorm
SMSWorm is an Android malware that can spread itself to a victim's contact list via SMS first seen in May 2021.
-
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.android.chrome -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.android.chrome
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.2MB
MD54e9ba96af7753d99363f30dba7581b70
SHA142ce800b1bcf6abfbf23979a2bfdef02fb05cbcb
SHA256c1a6cce82d0df02f4f6c27d0b3f2c4f181b6fff6b67b0a3bc70084c434936707
SHA51215ef901df6fe36cf5ea06021bd22c065fcdd057592d1e173b7c2c14636de801762d8326a9e5b742e8f74be8ca3c030695a367a4b7d609d7e4e07adacfed8bb79
-
Filesize
911KB
MD55486b2861502e2ba06401529da1c0b5d
SHA104ce37cda4581ae92fa052a9f08796fecc5eb9b7
SHA25632d2b8c278a2c0b3a3837b2752c447356fdfea19e323540dc06e1125446c9074
SHA5128dd936a7e2f3ac2d58189dcb13be1d19d13885f22ec3ae7ddedff1e8fc2c89ccfcf1a12ad87811187eeb2264424e95bb85c42c10d0540d0fcc8748af1a9bcfdf