Analysis

  • max time kernel
    149s
  • max time network
    158s
  • platform
    android-13_x64
  • resource
    android-33-x64-arm64-20240910-en
  • resource tags

    arch:arm64arch:x64arch:x86image:android-33-x64-arm64-20240910-enlocale:en-usos:android-13-x64system
  • submitted
    07-11-2024 22:09

General

  • Target

    90b13347594f8365eddd3098c85678b0e441fe3b8ba23dcd3b4e01860dc3e7c8.apk

  • Size

    209KB

  • MD5

    09001fa6e8bc152d7e76a1704cb3242e

  • SHA1

    11f05f17b64d5171f5b84052965b403514c0fbc3

  • SHA256

    90b13347594f8365eddd3098c85678b0e441fe3b8ba23dcd3b4e01860dc3e7c8

  • SHA512

    1d211e8028262ae2f41d69c693ae931b919ce5a6a1a2fce3de6bea5f09b3c46cb9ecc0523d6ae57974247cf5f4e708e204e865894d0955f0194dbb67e6009b86

  • SSDEEP

    6144:OrLsdjVXITeLW1Gff95MQTN9W+2NXKF6fraw:kLGVXITeLWAfHniN6FKraw

Malware Config

Signatures

Processes

  • h.xaeeei.jfy
    1⤵
    • Checks if the Android device is rooted.
    • Loads dropped Dex/Jar
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Requests changing the default SMS application.
    PID:4478

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/h.xaeeei.jfy/files/d

    Filesize

    453KB

    MD5

    303ba9f99e501b9d01b3c4e8036f7995

    SHA1

    53196b13f94d7797527cc57742ce6d7b62aae36e

    SHA256

    9614110dedb36006ad490df5f5ab55975d8c7ea20c24f4a6479b9da8a946e7f0

    SHA512

    ef95d56bd53bc3098985a279922657d66d08912bbfe1b5e5c7adb3c4d6267e79ecea28c15036ae023b3c1b052cca9e3111f9a868f7f4178f14db7eaa297e432d