Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    07/11/2024, 22:06

General

  • Target

    7e9f5ffaa94cec8005ffdf350a61af6f3dad1af5019c3af59127dcf68a01cece.apk

  • Size

    4.2MB

  • MD5

    8ff3a904080a5639aee310183dd687ef

  • SHA1

    bbfc67b82a3fd08e0ee6b41a26e2349195ea7541

  • SHA256

    7e9f5ffaa94cec8005ffdf350a61af6f3dad1af5019c3af59127dcf68a01cece

  • SHA512

    8df7540763fa7836dae93751f7639c0d45e466c490507793dc2aae9a0167c1c0ee68f557af42ad85ea47f3e858dc1d846d40fce7750c66d840469abc8ae00b84

  • SSDEEP

    98304:G0frn8aaeAlkp8qVLrTWni4S9olUBh9asRw0nQ4Rg:QaaH686Lrj4S9oeInMRg

Malware Config

Signatures

  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

Processes

  • milestone.instances.dew.forts
    1⤵
    • Makes use of the framework's foreground persistence service
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    PID:4264
  • milestone.instances.dew.forts:watch
    1⤵
    • Schedules tasks to execute at a specified time
    PID:4297

Network

        MITRE ATT&CK Mobile v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads