Analysis
-
max time kernel
165s -
max time network
172s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
23/02/2025, 10:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://freerobux.en.uptodown.com/android
Resource
android-x64-arm64-20240624-en
General
-
Target
https://freerobux.en.uptodown.com/android
Malware Config
Signatures
-
Android SMSWorm payload 1 IoCs
resource yara_rule behavioral1/files/fstream-5.dat family_smsworm -
SMSWorm
SMSWorm is an Android malware that can spread itself to a victim's contact list via SMS first seen in May 2021.
-
Smsworm family
-
Checks CPU information 2 TTPs 2 IoCs
description ioc Process File opened for read /proc/cpuinfo com.android.chrome File opened for read /proc/cpuinfo com.android.chrome -
Checks memory information 2 TTPs 2 IoCs
description ioc Process File opened for read /proc/meminfo com.android.chrome File opened for read /proc/meminfo com.android.chrome
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.2MB
MD54c7ac5f64e2c8fc448f01afdf99b54ba
SHA11bfa0e9072087e1b75416595eb201636ca07b6b8
SHA256ba2f6d2dbea1fe62e15fc4ac7a243db64eb677cffcbb83dfdc022ae0679cc019
SHA512ef7b6a8fcf4b5d9935270135ceb2a66172045fdd76b7bfb39beeddaaa4fb0161433e2b6b09242f0c65605743d0003f93a8d14ce0b88e4b93b588857eb01247c2
-
Filesize
1.3MB
MD5122b3f426461c24a799676f8fca121fc
SHA11e2fab675dc364ec1ae798582597ff09417aed97
SHA25681314d8ef2b8a72d054be2c03ec5f33ee1e4646df59e53cc2d60485382ab24d9
SHA512ff8a57b6f55c6e17f3cff98ced830c2b31c21a6d59fecf9bfd2147ae5bae8bc7244379d61d9aa4bc8f3d0b91900b47f787ea90ce82c1aec7f95808c0acd00f69