Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    android-13_x64
  • resource
    android-33-x64-arm64-20240910-en
  • resource tags

    arch:arm64arch:x64arch:x86image:android-33-x64-arm64-20240910-enlocale:en-usos:android-13-x64system
  • submitted
    06-11-2024 22:09

General

  • Target

    a48cd8be7ad38f8d8956f843e0bc9e4e3c47447756b80747ecfa1400a7be1b85.apk

  • Size

    209KB

  • MD5

    b37cc999ebecaa5d3b80d0e034cf39cc

  • SHA1

    8788f525dc833cf93df087949e47e8ec50957f94

  • SHA256

    a48cd8be7ad38f8d8956f843e0bc9e4e3c47447756b80747ecfa1400a7be1b85

  • SHA512

    5a01e1035b7dae8f7cf047f1b1318414f3c999a7522959091fff8b2bec1390be01d3f4a98bc55c770c05afef83678534942c938c2a22167dbef2a93c42e80e72

  • SSDEEP

    6144:QGMq8GQEojAINykIkXgVuvkOVxq2eH/RDDC:QG/7opNfxQVuvVVXqRDDC

Malware Config

Signatures

Processes

  • b.vehyug.bsfjj
    1⤵
    • Checks if the Android device is rooted.
    • Loads dropped Dex/Jar
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Requests changing the default SMS application.
    PID:4521

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/b.vehyug.bsfjj/files/d

    Filesize

    453KB

    MD5

    62dded91437cc7c895dc49eab14c80f5

    SHA1

    5ba00620dabdb8b8c63d459a951d4850e8d585b5

    SHA256

    f86036172c22e92c8754a06846b5221ef5e957651c100c48205a85e650b3ad81

    SHA512

    8ae828640b439091186e5f929fda51abefd468c3fbd72e02ab2afdfdf0c9c9ebd367b807826b760ea159250a7ef5b1673c92c4db2e696ace6d019b3004d64f5a