Resubmissions

07-11-2024 02:45

241107-c82tasthln 10

06-11-2024 20:08

241106-ywk6nsxaph 10

General

  • Target

    HD_STREAMZ_Latest_Version_2024_HDStreamzs.Com1.apk

  • Size

    19.8MB

  • Sample

    241107-c82tasthln

  • MD5

    d9a3a25181c4e14d546b7a12cde29521

  • SHA1

    9f48d6bf76640e5cf64e1397baf357dde3938a87

  • SHA256

    71f44665d167f6c6fb93ebdadb0fc2b1513dd3589c5ecda84591bcba9f6f365f

  • SHA512

    d3da5cc4c4ea29f8bdac7f8199e8c38d7342adcc8908fe0f88dc87a431571178e94e19c08eba448da365aa32981fa12b34bc2c71a1060487d994866bd5a1a032

  • SSDEEP

    393216:DjGJoe37RquDHhFVhytkwrgcY9sNORkooI7wpZOTsAI6s9QfTEn3M14GEIV:nGL7Rq8xAawksNYnJ7wp8rIeE81Zz

Malware Config

Targets

    • Target

      HD_STREAMZ_Latest_Version_2024_HDStreamzs.Com1.apk

    • Size

      19.8MB

    • MD5

      d9a3a25181c4e14d546b7a12cde29521

    • SHA1

      9f48d6bf76640e5cf64e1397baf357dde3938a87

    • SHA256

      71f44665d167f6c6fb93ebdadb0fc2b1513dd3589c5ecda84591bcba9f6f365f

    • SHA512

      d3da5cc4c4ea29f8bdac7f8199e8c38d7342adcc8908fe0f88dc87a431571178e94e19c08eba448da365aa32981fa12b34bc2c71a1060487d994866bd5a1a032

    • SSDEEP

      393216:DjGJoe37RquDHhFVhytkwrgcY9sNORkooI7wpZOTsAI6s9QfTEn3M14GEIV:nGL7Rq8xAawksNYnJ7wp8rIeE81Zz

    • Android SMSWorm payload

    • SMSWorm

      SMSWorm is an Android malware that can spread itself to a victim's contact list via SMS first seen in May 2021.

    • Smsworm family

    • Checks if the Android device is rooted.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Requests dangerous framework permissions

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks