Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    android_x64
  • resource
    android-33-x64-arm64-20240624-en
  • resource tags

    androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system
  • submitted
    13-11-2024 22:05

General

  • Target

    9c69172ca00d3f5bdc0aab5da4fbc22967412557898ba3628523ee74287827b4.apk

  • Size

    207KB

  • MD5

    bc3abe4e5b179df800da7126beaafaff

  • SHA1

    6308bed1167ef11e44af55b7bd96be340b60028b

  • SHA256

    9c69172ca00d3f5bdc0aab5da4fbc22967412557898ba3628523ee74287827b4

  • SHA512

    96d1d93ebcb58fdde5b72e88bbc96fe6d13bb6d256c1591337bc7c14d7b9041e52dcda0e7b25b223da36e92ea2e11e3a778e93f72823ab6afd955748a44852f1

  • SSDEEP

    3072:h4PwhdkSj9O8EEX5omzR+QXkhJCN48ZAC1m0gCjkDOKH41Kr6feQ1VO78jj6hAXo:hThq8ba4/0XC/ZFbI0R2+E7MiACFYBe

Malware Config

Signatures

Processes

  • vt.patzmn.ks
    1⤵
    • Checks if the Android device is rooted.
    • Loads dropped Dex/Jar
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Requests changing the default SMS application.
    PID:4329

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/vt.patzmn.ks/files/dex

    Filesize

    446KB

    MD5

    44a56904eeea4043dd19316e827dabb4

    SHA1

    f8ea0ad3881ac5eed793c0059fce004fb1505646

    SHA256

    fe1428673b47ee2521304e5cbddfe481dd1ffc47e790a1e4ed35f0692e4fe62d

    SHA512

    62bc1865728e0755f3883733906e5d92619c3202d60e14e35f984b671ff1763cc5b96ccb7edf477f151734ac627dd7dcc90b8d09a9ed0754c26c3ba8f818d244