Analysis

  • max time kernel
    179s
  • max time network
    143s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    09-08-2024 22:15

General

  • Target

    9fbb85299da75bdced8590850d2f7aaac9392946d83d26252741074a6e19fc08.apk

  • Size

    205KB

  • MD5

    1762406f8856444a9c1f773d72441497

  • SHA1

    3f8139ccde70346ec3100999773720604d7b06f6

  • SHA256

    9fbb85299da75bdced8590850d2f7aaac9392946d83d26252741074a6e19fc08

  • SHA512

    140ba52831f4086b45ecc4d4304be6a8d37ada8bc497beb4cbb5eb772beb7af0b5b356e74ca5440737bc1d39a71eb245e6442233c748b2f1e2e08589297b5d88

  • SSDEEP

    6144:DNe8BPnoB3e/fIjmcRcUJ9uZHDafE8d0ODwDy:DwgPnIeYaudJ9uJDas8d3Ay

Malware Config

Signatures

Processes

  • ms.fb.rww
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Requests changing the default SMS application.
    PID:4560

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/ms.fb.rww/files/dex

    Filesize

    454KB

    MD5

    b4780eb1d06f60c614b3869a10bc6eba

    SHA1

    80be7de48d344c7c961a87478e8831343c1c234e

    SHA256

    8944f8852ff6e21ad4c5992308fcc9ef9e8c22f05fc807bcfeca0f4cba9de3d7

    SHA512

    bf18704d504994d8f955d6b7a2749de96c23206ef11817e9db3752020c81bff068843e97888f158aca8ee627a821fbd567aa0da96630bdc01e7c0d292f41d5f3