Analysis
-
max time kernel
3s -
max time network
151s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
08-09-2024 00:14
Behavioral task
behavioral1
Sample
7e41cd654128fdab2606a0975d132dddf036320744615d39118ace060608e6a8.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
7e41cd654128fdab2606a0975d132dddf036320744615d39118ace060608e6a8.apk
Resource
android-x64-20240910-en
General
-
Target
7e41cd654128fdab2606a0975d132dddf036320744615d39118ace060608e6a8.apk
-
Size
21.4MB
-
MD5
b9670781a6220f5db33c9dbd6c25238d
-
SHA1
d7b5125f47ffadc06b6e27ea900fa0dfa1f1cc6b
-
SHA256
7e41cd654128fdab2606a0975d132dddf036320744615d39118ace060608e6a8
-
SHA512
a18f1c5b326b8bab3df03a474e77c27414aea61e04f123651e4d1981bce1a39619f9954190b70ac1ac7eecffb09fbe60083c061b3bc66811890dc6582382a993
-
SSDEEP
393216:KD51hYo9wYYoIPH9Sg/2BUozTNR4pgka1SiDded0vQ5ofh5B:KF1h3aY/IPdSg/2BUozzSicd0vQ5M5B
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 8 IoCs
Processes:
com.swiftstreamzioc process /data/local/xbin/su com.swiftstreamz /sbin/su com.swiftstreamz /system/bin/su com.swiftstreamz /system/bin/failsafe/su com.swiftstreamz /system/sd/xbin/su com.swiftstreamz /system/xbin/su com.swiftstreamz /data/local/su com.swiftstreamz /data/local/bin/su com.swiftstreamz -
Checks known Qemu pipes. 1 TTPs 2 IoCs
Checks for known pipes used by the Android emulator to communicate with the host.
Processes:
com.swiftstreamzioc process /dev/socket/qemud com.swiftstreamz /dev/qemu_pipe com.swiftstreamz -
Acquires the wake lock 1 IoCs
Processes:
com.swiftstreamzdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.swiftstreamz -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
com.swiftstreamzdescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.swiftstreamz -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.swiftstreamzdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.swiftstreamz -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.swiftstreamzdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.swiftstreamz -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.swiftstreamzdescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.swiftstreamz -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.swiftstreamzdescription ioc process File opened for read /proc/cpuinfo com.swiftstreamz -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.swiftstreamzdescription ioc process File opened for read /proc/meminfo com.swiftstreamz
Processes
-
com.swiftstreamz1⤵
- Checks if the Android device is rooted.
- Checks known Qemu pipes.
- Acquires the wake lock
- Queries information about active data network
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4270
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD53b2923b9f9fb62cfbb48c47eb6463043
SHA187d42acd45c440a730be00c3e26e9e30270881db
SHA256c1e86723b4cf95a080342b59d5d407cddbe038ad3d376dd4c2edc02fbb6e1782
SHA512020356949698a7e24b0f5b2216f51b3c22fc5560806c7244d206e01cfe805ec453e99f3746a93e4c4fdc168ddd611ffc9e1bd2d5461616094d8d36f6dc06d1b9
-
Filesize
64KB
MD58d9cb16694323dd86c050a6f14382861
SHA1cf273f481433f0bbce4696dd3e8b9729f326e077
SHA2567121c386f84c3448986dafd65ee4e01031c1f80f2da105613b879fcba70d9636
SHA51248c53ac93ba36242cc0f16099543b5a6619c334aa4f66f3b52ebc34a64c77574b6220a926966a1a2c2190c0bf7f325bc68042ab324412698e40ca982f08a4b45
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5a43f29077c1b5d67a0cfe093b2b2551a
SHA1aed3293c3dc608f9534e85760fea9e1fc749c262
SHA25662daa1c647e41342bbaebbea6ff24f12a120b9c5d9eb80df672af93f1b7252be
SHA5124270a9c11eaecb2a9e852d5a581cb0dfca38d6105a68d208d2e1a7535dbeac8344060244b28fdb8fb543f5dbfc97278cae6a498ee47f507813d08e2819becf8c
-
Filesize
28KB
MD5cf845a781c107ec1346e849c9dd1b7e8
SHA1b44ccc7f7d519352422e59ee8b0bdbac881768a7
SHA25618619b678a5c207a971a0aa931604f48162e307c57ecdec450d5f095fe9f32c7
SHA5124802861ea06dc7fb85229a3c8f04e707a084f1ba516510c6f269821b33c8ee4ebf495258fe5bee4850668a5aac1a45f0edf51580da13b7ee160a29d067c67612
-
Filesize
36KB
MD50b2b11e8e2eff3ee65db251184d8c66f
SHA12209ca14b51d7def1b5eb6f55ced2218d2c27284
SHA256952ac6adf937853d6c68c65baddd31f10e1b6f18c0686ed188f825092e96640b
SHA512e240fbceb0a82ed0906b700e479f516b31733cd97784b0faeba604e49876950ce0393410910c9575a4c306af57d7b2b16dff249fc0daf1a2e113e809cdc919e2
-
Filesize
5B
MD59dcf2a6f12095ecff342e9fa0c5ca72f
SHA1c815f34691be353caa9de93bbdb00a31f62a9ed3
SHA2564e68143408826326220a32d6bff59e1cca3dd85f74b018aebd6723c5686c54e5
SHA5127ba3449f5ec3363bbee33d47abe471286cf78034dd70379fa4d0de5fd59215e8c58287eddffed1b9c3c74e157f6a9ad69b0c551001a62d04790bba49df48231c
-
Filesize
512B
MD5248a06dc3f1376ce4b7b2a400c93792c
SHA1d2e7641761e04a05234b1fa9cb1214726d277955
SHA2567cdce2720fb33082fc41cc89938da36865684dbe16d65b6def5f7e70981da74e
SHA5123f288af838f75f7b1d957c24fe296e5d053d37bce47772910ac6f9a4ab8d010acdef595f5059d9888ec5e60549da36a9edebe8eeb23417ad3da153b64f15b2cb
-
Filesize
16KB
MD5c45f0bafdeef8518a06ce70392eaee28
SHA12b209184aa1e898d90b23e11147eb5e68dcaa07e
SHA256a75f7756d587219c4f4b36d6c73b4733c3f7ab7217477efb76680eb32025666d
SHA512e3db90405034becad3971ec0fd29e592718f94e07b03b8c4ac4f643427bdd80f28bc21db1729b4c1bb85c5d408057fe0e7bcb7586cb8003ab383f8b699083ccb
-
Filesize
108KB
MD526528d37907c1cf980866191f90068d8
SHA18f4eea5c426f2d4467fe20f3c175e31aca056f11
SHA25671bc827cd658ce6664be66c8fe07c04292fd44bc9a4ee93185dabdc6c3ae2479
SHA512f2d82f8bf579a792dbb620c52c151ed295b3270c1b15eb267ecb98e8dba69611150325942b446048f6bf0d34737583a23d4da55c65312802da5bb163beaedbb0
-
Filesize
2KB
MD5e1eba995cbdb6afedf22fd6507417ec8
SHA123c10d56e99ed9deae910ca5d6faaf21b1aaa578
SHA25687177047704d3f05cc18d9013a778d142bf9991b5e262ffae08ba5bd228426f5
SHA512fb890c7079ffeee69a8e04783eb1d0ccd6a54699bc8d22a20cacf8fb5b3fbcc2151c9f841182dea6c4d05a4586daba9d1b7829735f41d61af3ac242e12c588b9