Analysis
-
max time kernel
329s -
max time network
332s -
platform
android-13_x64 -
resource
android-33-x64-arm64-20240910-en -
resource tags
arch:arm64arch:x64arch:x86image:android-33-x64-arm64-20240910-enlocale:en-usos:android-13-x64system -
submitted
19/03/2025, 03:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cafebazaar.ir/app/com.freecoins.newfreerobuxgenerator?l=en
Resource
android-33-x64-arm64-20240910-en
General
-
Target
https://cafebazaar.ir/app/com.freecoins.newfreerobuxgenerator?l=en
Malware Config
Signatures
-
Android SMSWorm payload 1 IoCs
resource yara_rule behavioral1/files/fstream-10.dat family_smsworm -
SMSWorm
SMSWorm is an Android malware that can spread itself to a victim's contact list via SMS first seen in May 2021.
-
Smsworm family
-
Declares services with permission to bind to the system 1 IoCs
description ioc Required by VPN services to bind with the system. Allows apps to provision VPN services. android.permission.BIND_VPN_SERVICE -
Requests dangerous framework permissions 5 IoCs
description ioc Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE Allows an application to request installing packages. android.permission.REQUEST_INSTALL_PACKAGES Allows an application a broad access to external storage in scoped storage. android.permission.MANAGE_EXTERNAL_STORAGE Allows applications to use exact alarm APIs. android.permission.SCHEDULE_EXACT_ALARM Allows an app to post notifications. android.permission.POST_NOTIFICATIONS -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.android.chrome -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.android.chrome
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD54e6155030737c8caea3f38222847874a
SHA121a873c78196a07b7468c9619051753735df6867
SHA256bfbb2c1d4c48b7d572eba3afb3c07766f988eb75030ceef1cb5e27dd8d17eb39
SHA512af008c30f993ae0ccb29a4496fc711054ed47e179b6dc8cddefe87792fb36ec78761e677874e02b0effa5466e3b44f739de2dc3fa5c0912691ff6e005779fb3a
-
Filesize
21.2MB
MD576136f6e2cc6af4ab9be0242309e933a
SHA1421d2e9d15db05babf5b51899787c4a42bb8dbd6
SHA25610c06d4dd7e63b7374a5c6949411f7da05744a2e6d0140f93250820a8f421048
SHA5120f2ea758f3ec25b4e61efeff91b7867424e4ad990494401fed2950b02713c508bad7df83807025acb027c3b7ee29720fa6e0a7a19d8fce1cf76e1dffba627340
-
Filesize
1.7MB
MD5b82c81900e045dcbcf7f41fd574de021
SHA1fe1d3567b8808b7f5b7a1fefd46ff563aa8553f0
SHA256451ed19e1a23256c1c3e9dffb074ac9af58ea7999fb4296579d6c175c2cb1c51
SHA51255e718d9ac6313a881b39a0aff37d49a850b7f14c5db262f5b58a7cd1c07b0ab1239a361c8121ee5d8ac682f1282bdd3ac95d286e7821bb72e901e04798584e9
-
Filesize
9.2MB
MD5f2453811cddc90116ce63d9ea7753d55
SHA108a004935949cca204f25d04c36bb4d51c3a0837
SHA2568030f845f6007789d7faed73d241f76327b385dc61330071fe330d7e5261068c
SHA51294a4cdd7999f66d1c9c6e71e253d3628dfd8ec2079a5577a547f7a902adbf3b97291f6c0879936e0c90fc2f595911354ceb36a634985e6295bdc3b279b77f905
-
Filesize
1.2MB
MD502e280d1120336b7c5467f96f4376b4f
SHA12b621164a0fca6d94c871df347851c25ed875d31
SHA256a3fad769c39d39910b617b3484bf89baa460fd4d10d0e2329b9c9fe71d00ed9b
SHA512fff1f80afe19331fc493c5a5b9b3d5cc5f20252539e0f285686a9c09000cae878c9908c8cfbfc0a1223d41a3673f12d519592883060900d63b0e76edda65e240