Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    20-01-2025 22:11

General

  • Target

    70db2849fda57b771012313e9fe6d97159af8bb1e26b5b572f64ba694bdfe808.apk

  • Size

    302KB

  • MD5

    7a658d7749d9d575182df10649c7bf1b

  • SHA1

    a1ea329dc01b8db4d87d5f15865b789db9cd0699

  • SHA256

    70db2849fda57b771012313e9fe6d97159af8bb1e26b5b572f64ba694bdfe808

  • SHA512

    bff4888efc52f28924d9b2be3e79e2aa1fe691db7b970ccc7b22e1703f76eacc4030c41d7cabe708e02db810f4519bba103a2ceb5ae975278b0f8516b75bc1c0

  • SSDEEP

    6144:d+T5/hvQf9dawLcMezMBHcle7IxWuJru7sqfrpcmXYwZ291iaVIUs0Dmw:d+xhvSgwL6z2We7mFoXfNXYwZW1JIUsa

Malware Config

Signatures

Processes

  • ooao.zgwyn.qhyim
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Requests changing the default SMS application.
    PID:4531

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/ooao.zgwyn.qhyim/files/dex

    Filesize

    580KB

    MD5

    8c7542abcfd5e2c08e99555d8d0bc605

    SHA1

    5f40007a5343603be18a1ce3c39ce43604099be5

    SHA256

    0cd2b17aa21cd8de63842da21e3464df7bb2bd4a278fffbbfea6b294c3ca9e6d

    SHA512

    362c7dd23aa52a9c72e9d90eebb99e1d4e4cd01b68348249bbeee4bb407728aabd30874488926635bacb2e1d640ad4e95852e345afa8ad66057c80c8f768ed88