Analysis
-
max time kernel
60s -
max time network
148s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
30/01/2025, 15:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://freerobux.en.uptodown.com/android
Resource
android-x64-arm64-20240624-en
General
-
Target
https://freerobux.en.uptodown.com/android
Malware Config
Signatures
-
Android SMSWorm payload 1 IoCs
resource yara_rule behavioral1/files/fstream-5.dat family_smsworm -
SMSWorm
SMSWorm is an Android malware that can spread itself to a victim's contact list via SMS first seen in May 2021.
-
Smsworm family
-
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.android.chrome -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.android.chrome
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.2MB
MD552b434458db994225d86bc8c0d9c1620
SHA14f54b4c9488560152e70274cfa5c8ffab121eed9
SHA25650ef90d98efa89fe89ec11418bb94f8e0c63b8b5c8b7583dfc9eae62a401d82a
SHA5122fc51a090ee7335154915c6f0bf8a77f8c0d6c90005e8ddfda4d87360d50ae5c89b16ed89d9eb64a9a57fa27aaef07c1efbe31038b076acd81e3c5f1b5973b79
-
Filesize
591KB
MD57982a95eb75d2aa95f83c44cc0edc8a2
SHA1a3f1987e05af1c85f8f120c7520fa72bccaa5d18
SHA256f56eb4af84cd4504800b6f9724ee335663e39862cc17d1be52d83928aa172f78
SHA512bced1c0f673865479bf6d7d026e39161f6b9cda7a07f1c8b5231f465ac07566736a2ccceae306c5a5ffe06b5596bafc5d18f0e893d72f878bb0841fca4c03078