Resubmissions

21-11-2020 14:18

201121-py7zfckqg6 10

21-11-2020 13:46

201121-axqe2s9nta 10

Analysis

  • max time kernel
    3943715s
  • max time network
    157s
  • platform
    android_x86_64
  • resource
    android-x86_64
  • submitted
    21-11-2020 13:46

General

  • Target

    yJuHrRdFtA.apk

  • Size

    218KB

  • MD5

    a6247c862bfeb6e3083bf2a81193426a

  • SHA1

    f4a4ad1efe413b48a21f85e7f9fd1f57d104408a

  • SHA256

    6447b808a2a99cf9f932ca731524a81e994824544e39cc3631870f7e66f6ff59

  • SHA512

    bc0f7557d56c5343dc4435173a77518e57264a6693dfe9948094fe0ea03ac669feadd0818f7ab7dab7a5f45e0ad6cde41b902a84847f00db1dc8853f4684d26d

Malware Config

Extracted

DES_key

Signatures

  • Removes its main activity from the application launcher 1 IoCs
  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Reads name of network operator 1 IoCs

    Uses Android APIs to discover system information.

  • Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
  • Suspicious use of android.app.ApplicationPackageManager.getInstalledPackages 2 IoCs
  • Suspicious use of android.net.wifi.WifiInfo.getMacAddress 21 IoCs
  • Suspicious use of android.os.PowerManager$WakeLock.acquire 1 IoCs
  • Suspicious use of android.telephony.TelephonyManager.getLine1Number 59 IoCs
  • Uses reflection 64 IoCs

Processes

  • jnuv.oaczs.vhxul
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Reads name of network operator
    • Uses Crypto APIs (Might try to encrypt user data).
    • Suspicious use of android.app.ApplicationPackageManager.getInstalledPackages
    • Suspicious use of android.net.wifi.WifiInfo.getMacAddress
    • Suspicious use of android.os.PowerManager$WakeLock.acquire
    • Suspicious use of android.telephony.TelephonyManager.getLine1Number
    • Uses reflection
    PID:3543

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads