Analysis
-
max time kernel
149s -
max time network
152s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
27/03/2025, 11:05
Static task
static1
Behavioral task
behavioral1
Sample
d8452b39b1962239e9dbe12e8a9d8d0ee098b9c8de8a8d55b5a95b67b552102f.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
d8452b39b1962239e9dbe12e8a9d8d0ee098b9c8de8a8d55b5a95b67b552102f.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
d8452b39b1962239e9dbe12e8a9d8d0ee098b9c8de8a8d55b5a95b67b552102f.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
d8452b39b1962239e9dbe12e8a9d8d0ee098b9c8de8a8d55b5a95b67b552102f.apk
-
Size
161KB
-
MD5
de6ef70d8f9e0af2071a9ba1be902a37
-
SHA1
fb4bc1d9b1b6f1f22331dee8ba300d32b2563649
-
SHA256
d8452b39b1962239e9dbe12e8a9d8d0ee098b9c8de8a8d55b5a95b67b552102f
-
SHA512
a2cc63f788caa00678a6d90ac655b71ee28f8bb999239fe71475ce87a78180bffe4ae114b825d319995741b1bc005111ba8fa72d1d20686c9bb4baf169776879
-
SSDEEP
3072:SQZGjcHoU3QiCxEH14Xj4JKBLRP9cuTqUcanhXEcMYZ4JBpEFRrCVJnacL:SQZGjcOBQSj4CcuTqfanh9Z4TiFRrCHT
Malware Config
Signatures
-
pid Process 5085 net.homeclasswindwater.daymaildayeye -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/net.homeclasswindwater.daymaildayeye/app_yahkvtrmc/atdvwcobv.jar 5085 net.homeclasswindwater.daymaildayeye -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Reads the content of the SMS messages. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://sms/ net.homeclasswindwater.daymaildayeye -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock net.homeclasswindwater.daymaildayeye -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground net.homeclasswindwater.daymaildayeye -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo net.homeclasswindwater.daymaildayeye -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo net.homeclasswindwater.daymaildayeye -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver net.homeclasswindwater.daymaildayeye -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal net.homeclasswindwater.daymaildayeye
Processes
-
net.homeclasswindwater.daymaildayeye1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Reads the content of the SMS messages.
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
PID:5085
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5df89eecea8d42ef21924343b957ba365
SHA113818b1cd0fb1307e12a9266603c6c0ad9e730e4
SHA2562e3407ed8bc813e4679e74fbecabdac355bac9e16d59fce72d88c57c4a15d779
SHA512a920ebed16b0f1e0ed75eb16a52e0ed81690910f4fa7d30351127e391f0424796c234018abfed7645434457f83f0cc2df2096001b9ef13e54dd640d804910834
-
Filesize
119KB
MD5f3aebfbe829f689f446f22b4192cf3f2
SHA1526cf9685769c7aca25543467e2010e1c843d3f6
SHA2565f293e8a9c5301c9b85c1ae8e9f190e0861b417b135354f438795885e9d9a514
SHA51257f52d1e7301ff4c92d6d6306772f7f50f2773fe0f8eeadb8d128b11658e13d8cdd08b79211350097dd34cf6e4d61a71f1eadf7446e93abcc8bc1143f3b92628
-
Filesize
176B
MD51ffcc42b74acc5c2c06d5c28ab60e284
SHA126c333e1f4d929aab5acb1ce2a0766103b834844
SHA2560c4632d81441b83c2289857e97f45aaa40887ca0d26f62ffe9093ac54d99f67f
SHA5125dbc5f1a50f299acd79bbcc9e3eb5f83fbd804b8f04e9990014ce3fdf142b7c54bb4c8c0ec1d2ac39179f49a5571e82ac7b04733305ce3729aa60ef2c207bfd8
-
Filesize
180B
MD5f1f9cd674b3e482bdb61fcf216d7ba51
SHA12a81987cec0d9cbde1ea21e63a8e7af78ee7be14
SHA256781fba702a5886a5a613444cbeaee6f2948d4b110765d732d1e6eb8a20465924
SHA51236b76716b436d534588e9146f28177735666b98140d6cb5c5f80e81d174014bf91a1bfa8b72959c319887af1f10168c95ef8daab672828a0a40aca20a3f44866
-
Filesize
180B
MD5d32a3adc14fcf819fbbf193d6cfd650e
SHA1a4c20f35981ac21edfff0c5a2a44e0f024c26a52
SHA256b9fb7ed392063ed45f6488137eadf198df15b6582ea90fb48b3f5eecf0ab608e
SHA512d617aed7a4e6565caea30e332588c0e8bacd1b06d2923b06bbcda9d39f5f2d7d313a38a434b72700b41e301dd71398a0c2d2985f609401f7c355d2e00029ca98
-
Filesize
176B
MD55f551081b3069987419e6ef0b784a12f
SHA1745a14eb9c6b70d9144cee3158057abcd6a2aad4
SHA256a26f1d8372bf11059521400d109acf321746bf710f3cea114f7399b61fc04670
SHA512ba539f1c23f8ff10c25977df24bcea9eb663778695cfde86b66a4c4a6b87934d5e77a07f36fdb988fabb977855a2235ca73c47016e3104cd15f2f01ef93c7ff4