Analysis

  • max time kernel
    179s
  • max time network
    151s
  • platform
    android_x64
  • resource
    android-33-x64-arm64-20240624-en
  • resource tags

    androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system
  • submitted
    09-08-2024 22:12

General

  • Target

    6a58560ded9bcc9b2fd428105cad9664c6bb9821780df2127a506a142f640bb8.apk

  • Size

    213KB

  • MD5

    ab442d43f8939a6025deb8296826c7dc

  • SHA1

    8c911f792145dd4c44c1e1265376d47924b2cf1f

  • SHA256

    6a58560ded9bcc9b2fd428105cad9664c6bb9821780df2127a506a142f640bb8

  • SHA512

    942b8a789cde5fca353ef58839f4fc2e3e10812a787c8576043f92d9cad331908080bc994c9ca1427f85ad93a6e70f7e9751ecd2835f5a7021147c384083f61e

  • SSDEEP

    3072:b3wI0YfCOVl3ZKgt3oB7XVWK/85EVYnLF1xh+DNMQr6RJz3emHSX0hxZNQvpllg:zV64l3UJZQLPGpMU6/zMX0hxZNIg

Malware Config

Signatures

Processes

  • y.jrjw.snvtt
    1⤵
    • Checks if the Android device is rooted.
    • Loads dropped Dex/Jar
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Requests changing the default SMS application.
    PID:4338

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/y.jrjw.snvtt/files/d

    Filesize

    453KB

    MD5

    9f192de58387719442a1398f59cf8e99

    SHA1

    84c5566e56f2fe64c1b9cc22876b50d440457798

    SHA256

    318c827f7a1af28e4709e1a47ef75854e63b326e76f61c5e05ed54298a270add

    SHA512

    c1e33cf432c4993171c0f7776a42b3465d88caca70f04c5ecaaf6d600c5d2bd38821185f1506dba34b7785751cdccef11cf4c2aba62afcd4b2064e37c8993227