Analysis

  • max time kernel
    4203049s
  • max time network
    147s
  • platform
    android_x86
  • resource
    android-x86_arm
  • submitted
    13-01-2021 06:51

General

  • Target

    tmp6uz7mg_2.apk

  • Size

    2.5MB

  • MD5

    624d742e39ade0b348bf64e3bb95f522

  • SHA1

    b390dc4f1d95591ba51a2dd1c3fb558d59dc6e4e

  • SHA256

    3527dcd60b3f476a25f2e4828fb05633847e58b6939895a05aacd2a89b847d3d

  • SHA512

    6cd1c84d4819ba45bdceb6af8b8e034fcc2bbd795d2c54dabf704132d7da25200bb29b17ef45026c3e9a7a57c1f721e74517f7c644b00fda1965107683fde3ba

Malware Config

Signatures

  • Removes its main activity from the application launcher 1 IoCs
  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Suspicious use of android.app.ActivityManager.getRunningServices 44 IoCs
  • Suspicious use of android.telephony.TelephonyManager.getLine1Number 9 IoCs
  • Uses reflection 46 IoCs

Processes

  • friend.cigar.spray
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Suspicious use of android.app.ActivityManager.getRunningServices
    • Suspicious use of android.telephony.TelephonyManager.getLine1Number
    • Uses reflection
    PID:4890

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads