Analysis

  • max time kernel
    179s
  • max time network
    168s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    09-08-2024 22:15

General

  • Target

    c2dc31eb4daaa4d3b5b5846968f8e96cbd7a42394cfb9abb6ff32ab4b51d05f7.apk

  • Size

    205KB

  • MD5

    fae8aaa0691837760f92935068d00401

  • SHA1

    0b35df462fcd6ca9d21b21c103f50e0347738664

  • SHA256

    c2dc31eb4daaa4d3b5b5846968f8e96cbd7a42394cfb9abb6ff32ab4b51d05f7

  • SHA512

    17681a846b04f44fa77ec5eb76a85de348c4af8183b0d3cb017737625960a60ef7bfcbbc6dd68903b20df17d83309ff280a3bed0ced7b87b378325546449e5cd

  • SSDEEP

    6144:C9eqHYEfoB3e/fIjmcRcUJ9uZHDafE8d0OD7V:C9eOfIeYaudJ9uJDas8d37V

Malware Config

Signatures

Processes

  • z.cttynk.gqroqf
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Requests changing the default SMS application.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    PID:4222

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/z.cttynk.gqroqf/files/dex

    Filesize

    454KB

    MD5

    b4780eb1d06f60c614b3869a10bc6eba

    SHA1

    80be7de48d344c7c961a87478e8831343c1c234e

    SHA256

    8944f8852ff6e21ad4c5992308fcc9ef9e8c22f05fc807bcfeca0f4cba9de3d7

    SHA512

    bf18704d504994d8f955d6b7a2749de96c23206ef11817e9db3752020c81bff068843e97888f158aca8ee627a821fbd567aa0da96630bdc01e7c0d292f41d5f3