Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    19-11-2024 22:02

General

  • Target

    68075aa5c42f9ca45984cd6759ede1414c62cb3f5daac9980d4629220c22f80d.apk

  • Size

    446KB

  • MD5

    c27720001612a5fd23d818727582ed86

  • SHA1

    ec8a9c985cebcb86af6c02dadb15e8b5537abb04

  • SHA256

    68075aa5c42f9ca45984cd6759ede1414c62cb3f5daac9980d4629220c22f80d

  • SHA512

    55c308bad77341033835b8711c3c1b532f8aa13dd3439804f6fa0148bcbbfc0ef1191690cb585aca60c9cc02c2138823b9bb5fe63cbb634061b28df96faa0532

  • SSDEEP

    12288:jrZBNEzobMKwSszBh6+JBSCNdSwro7h1W/9:jvNxbM5XG+JTNdSwSe/9

Malware Config

Signatures

Processes

  • com.usmb.apzn
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Queries information about active data network
    • Requests changing the default SMS application.
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    PID:4772

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.usmb.apzn/files/dex

    Filesize

    778KB

    MD5

    d1ff3ccac03059ef7bec6432b69e9baf

    SHA1

    0bb0361421e784469b4638dc30c17b831fd3d1ee

    SHA256

    9b9b331ef68c83a54db30df87a81373aa8c540683bdc5921468326342e6e7839

    SHA512

    f6de314661188ae8845e78763f3e2218dc7dac672cb0dab96af78151021696f7c29e6ee72e126465a3e3d87651e52a1633a2d673df40bbb7fc94a03153f6b963