Analysis

  • max time kernel
    179s
  • max time network
    142s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    09-08-2024 22:18

General

  • Target

    3c23c3f68691d0fd7f64b0f2d30987f67606448c9fdc81d666d21bea0177bb46.apk

  • Size

    208KB

  • MD5

    d0cc56a38e2aba4294ce4181dd36e5f1

  • SHA1

    a91485ea9c18a0ca738af31d5fff37abf3d615b7

  • SHA256

    3c23c3f68691d0fd7f64b0f2d30987f67606448c9fdc81d666d21bea0177bb46

  • SHA512

    39d479ebbc6d2bf3d1f55fcea683dd9befbca9c4f3728a0873c451be2036863ee3d59975653c24f8058d6525a6e6df246274f2dacb6b33639fffe563b229d887

  • SSDEEP

    6144:tgCa1uauEu2axIU1WUHx9y26hBue73dxKUN2+T:KCaYaFjaIUHx9y39ZN2+T

Malware Config

Signatures

Processes

  • i.rhj.wt
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Requests changing the default SMS application.
    PID:4634

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/i.rhj.wt/files/d

    Filesize

    446KB

    MD5

    a5c03847adaa5cfc2a89b612c5e7109d

    SHA1

    68b56e1996cb8a191900bb56c858d8c295e83637

    SHA256

    de166f7a253172ab55334dbc81bcfcf8d04e924ea3d261375653d86936c699d5

    SHA512

    f8326dbc3d66bc5b8519be5c5d1a1b02c4e2188a530d9019c1350b1c035ea9143c3528709c4a53230ecafc1e7241ea0bd7203f4013acd47a411415f64117bc97