Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    18-09-2024 22:03

General

  • Target

    11b07a9b8dfa975fa7d849b681f9a3d8a4333746233f8410d86a9167286efc6b.apk

  • Size

    283KB

  • MD5

    07d8e46a2b9bb0514286b5f633321b1f

  • SHA1

    4ceba5f14d3586216079efc7eb8ea20e33195dce

  • SHA256

    11b07a9b8dfa975fa7d849b681f9a3d8a4333746233f8410d86a9167286efc6b

  • SHA512

    77ee917b47a80ba715acbc3f69b7f4a5f19f8ec90851c4f4982544ee043eb38f590b425a210d4e0d081294bbe0a7661ff47043db08977725a6d1c950f85c4e6a

  • SSDEEP

    6144:n1rGsxAlQpIZr6EHsQ8xeHOMrt48fBxnf7Ucpzq9R+Bo8/y5B:Wl9r68sQ8kvrt5Rc9sC5B

Malware Config

Signatures

Processes

  • iegafg.ioixu.ezr.yztq
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Requests changing the default SMS application.
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    PID:4440

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/iegafg.ioixu.ezr.yztq/files/b

    Filesize

    509KB

    MD5

    b2b23c0bd2f870df08dc4f60a1f5c64b

    SHA1

    66f8456a8f024da01e77c119bfd90cad9c1f8029

    SHA256

    de0fcf61abbc9e7879343135ad0a42e600f39cb04136966c956b54326679e992

    SHA512

    fb7e16e08ef0d7489ce18a79cf788d86dc8784ac3027e126ad225c6cd32b44e7c815ee86b4ff633177ff8679150b51d9d0e59f11bdc2af1c28fdaf8dc0079f4c