Analysis
-
max time kernel
476s -
max time network
489s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
30-06-2024 14:25
Static task
static1
Behavioral task
behavioral1
Sample
04c15411b2ce3b409bb84996ad9db477.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
04c15411b2ce3b409bb84996ad9db477.apk
-
Size
24.3MB
-
MD5
04c15411b2ce3b409bb84996ad9db477
-
SHA1
731ed42d2f2387b2d83a6f981f2bfe34585b7e9c
-
SHA256
e883daf1d0a22e4124bd8d62635680711ab775652aabb335152fb69884018959
-
SHA512
d0cf76ae3414b68d198a0afc7d856fa27d5043b20a74ae0eafc8e632330b381b53b554146d6c7ad88b06ea9b9b9386bffc682e265dcaa4455a890dc83b865f7b
-
SSDEEP
393216:FIWSptsKjZF31igZgw6Z6XymZQA9kSLjr4l2O7ctQLclWpPX:utptfdFFiU66XydA9Dg7ctuxPX
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.ijhgdry.ijhgdryioc pid process /system_ext/framework/androidx.window.extensions.jar 4347 com.ijhgdry.ijhgdry /system_ext/framework/androidx.window.extensions.jar 4347 com.ijhgdry.ijhgdry /system_ext/framework/androidx.window.sidecar.jar 4347 com.ijhgdry.ijhgdry /system_ext/framework/androidx.window.sidecar.jar 4347 com.ijhgdry.ijhgdry -
Reads the content of SMS inbox messages. 1 TTPs 1 IoCs
Processes:
com.ijhgdry.ijhgdrydescription ioc process URI accessed for read content://sms/inbox com.ijhgdry.ijhgdry -
Reads the content of outgoing SMS messages. 1 TTPs 2 IoCs
Processes:
com.ijhgdry.ijhgdrydescription ioc process URI accessed for read content://sms/sent com.ijhgdry.ijhgdry URI accessed for read content://sms/draft com.ijhgdry.ijhgdry -
Acquires the wake lock 1 IoCs
Processes:
com.ijhgdry.ijhgdrydescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.ijhgdry.ijhgdry -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.ijhgdry.ijhgdrydescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.ijhgdry.ijhgdry -
Checks CPU information 2 TTPs 1 IoCs
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/system_ext/framework/androidx.window.extensions.jarFilesize
123KB
MD53056e1bdb7d4e19789d0319eff484bd0
SHA16791ae47aa9466fe0bca27ad6643f846853bbee4
SHA2568e6331a07c9f2ac139214c527dcaff2c82d126bbe7bd3420cdc36d6a8c9204b0
SHA512c790980fd68d9f89e32743bc28846807d5e5947c555f494de47714dec5cbd0c08d81c3260fa463759d1b17a953af3c44ec30b14fb08bf6b29db3837346c9f658
-
/system_ext/framework/androidx.window.sidecar.jarFilesize
25KB
MD529469324e59dfcc052f24b5af4e7b2c4
SHA110c1e17ac6f598037bb51baa07945663645de4eb
SHA2569195dc6a1c75a841384050240dfc972e48178964993fba6619788625f4b40d1a
SHA5125e27c2b1431369a248298f2f749136a575005584f9999f2a4c204a0c47adce2e33c8df9f058bdafa1bde1c99e46d175560cedfcddcd8581718ed1d9973c37cc2
-
anon_inode:[eventfd]Filesize
8B
MD533cdeccccebe80329f1fdbee7f5874cb
SHA13da89ee273be13437e7ecf760f3fbd4dc0e8d1fe
SHA2567c9fa136d4413fa6173637e883b6998d32e1d675f88cddff9dcbcf331820f4b8
SHA512991294f43425a5b80f8a5907ca7cdbb611401282585a58bb415077005428e3b4c0f661fc07ba5c45f627bd8bdcb172389ce2fda461c029b837abc70f0abbea20