General
-
Target
HD_STREAMZ_Latest_Version_2024_HDStreamzs.Com.apk
-
Size
19.8MB
-
Sample
240822-zpe7hsxcqd
-
MD5
d9a3a25181c4e14d546b7a12cde29521
-
SHA1
9f48d6bf76640e5cf64e1397baf357dde3938a87
-
SHA256
71f44665d167f6c6fb93ebdadb0fc2b1513dd3589c5ecda84591bcba9f6f365f
-
SHA512
d3da5cc4c4ea29f8bdac7f8199e8c38d7342adcc8908fe0f88dc87a431571178e94e19c08eba448da365aa32981fa12b34bc2c71a1060487d994866bd5a1a032
-
SSDEEP
393216:DjGJoe37RquDHhFVhytkwrgcY9sNORkooI7wpZOTsAI6s9QfTEn3M14GEIV:nGL7Rq8xAawksNYnJ7wp8rIeE81Zz
Static task
static1
Behavioral task
behavioral1
Sample
HD_STREAMZ_Latest_Version_2024_HDStreamzs.Com.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
HD_STREAMZ_Latest_Version_2024_HDStreamzs.Com.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
HD_STREAMZ_Latest_Version_2024_HDStreamzs.Com.apk
-
Size
19.8MB
-
MD5
d9a3a25181c4e14d546b7a12cde29521
-
SHA1
9f48d6bf76640e5cf64e1397baf357dde3938a87
-
SHA256
71f44665d167f6c6fb93ebdadb0fc2b1513dd3589c5ecda84591bcba9f6f365f
-
SHA512
d3da5cc4c4ea29f8bdac7f8199e8c38d7342adcc8908fe0f88dc87a431571178e94e19c08eba448da365aa32981fa12b34bc2c71a1060487d994866bd5a1a032
-
SSDEEP
393216:DjGJoe37RquDHhFVhytkwrgcY9sNORkooI7wpZOTsAI6s9QfTEn3M14GEIV:nGL7Rq8xAawksNYnJ7wp8rIeE81Zz
-
Android SMSWorm payload
-
SMSWorm
SMSWorm is an Android malware that can spread itself to a victim's contact list via SMS first seen in May 2021.
-
Checks if the Android device is rooted.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Virtualization/Sandbox Evasion
3System Checks
3