Analysis

  • max time kernel
    149s
  • max time network
    142s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    13-11-2024 22:08

General

  • Target

    c2cc021757b0bdb4577f1221442862243111ae7190a548475c773062986a492a.apk

  • Size

    302KB

  • MD5

    a327e750ffd50b6200b4251bccbd6e12

  • SHA1

    f29e90e4d8799f293bc3db7227de4f3daf394523

  • SHA256

    c2cc021757b0bdb4577f1221442862243111ae7190a548475c773062986a492a

  • SHA512

    7e0f9ec10d9a1ab901a86888000e5423d736fecbd098b990ee42bbd856ccb90e0280ad4e3ea2472171536836393aa1089238ec7f34313c818272a9c833913d6a

  • SSDEEP

    6144:HfCcmkf3Kbf6dYjNUVYE7uPJwEZ0lQ9B70mRDbah8CffM:HfCc2NjM7uxcO5xGuCffM

Malware Config

Signatures

Processes

  • xsfy.cqqya.lpofx
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Requests changing the default SMS application.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    PID:4238

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/xsfy.cqqya.lpofx/files/dex

    Filesize

    580KB

    MD5

    8c7542abcfd5e2c08e99555d8d0bc605

    SHA1

    5f40007a5343603be18a1ce3c39ce43604099be5

    SHA256

    0cd2b17aa21cd8de63842da21e3464df7bb2bd4a278fffbbfea6b294c3ca9e6d

    SHA512

    362c7dd23aa52a9c72e9d90eebb99e1d4e4cd01b68348249bbeee4bb407728aabd30874488926635bacb2e1d640ad4e95852e345afa8ad66057c80c8f768ed88