Analysis

  • max time kernel
    4203381s
  • max time network
    157s
  • platform
    android_x86_64
  • resource
    android-x86_64_arm64
  • submitted
    13-01-2021 06:51

General

  • Target

    tmptt2iegvy.apk

  • Size

    1.9MB

  • MD5

    db026fe524d1ce98de04374ff374fdf0

  • SHA1

    def50bc6a9d970846659c00fb529446af06483c7

  • SHA256

    dc215663af92d41f40f36088ec1b850b81092ea94a4a061a9ce88178daee965a

  • SHA512

    6102b8b355e30aa89befbd146564e00ac54ec2aea4f8ecc114edca226f6ffbf5210fe0484a20fa4b0a24098430450550d7ef7cef6acf72f8e94051b2630721cf

Malware Config

Signatures

  • Removes its main activity from the application launcher 1 IoCs
  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Suspicious use of android.app.ActivityManager.getRunningServices 204 IoCs
  • Suspicious use of android.telephony.TelephonyManager.getLine1Number 2 IoCs
  • Uses reflection 34 IoCs

Processes

  • msqqqwokejyfwim.bzsotef.ftonpdptfkkfhcjxkrr
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Suspicious use of android.app.ActivityManager.getRunningServices
    • Suspicious use of android.telephony.TelephonyManager.getLine1Number
    • Uses reflection
    PID:4366

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads