Analysis

  • max time kernel
    4203149s
  • max time network
    186s
  • platform
    android_x86
  • resource
    android-x86_arm
  • submitted
    13-01-2021 06:51

General

  • Target

    tmp0m42ypcg.apk

  • Size

    2.7MB

  • MD5

    76b35e470d17120bbd541c9e3b160ddf

  • SHA1

    feb35078107586c403adb046c48ecd23d0e6d22f

  • SHA256

    cb2aa894755825306671f2cfd4b76aa052d83dcf2a5f9d7c15887e040ab6e0d0

  • SHA512

    ad989e77eabdb53d6f4522b8aeb160d27dc0d822c86f6036ccb8da863229fc21eced4451db67b0f3aca65d78b886763df18354d6bd74c644a30838d5c54d5cff

Malware Config

Signatures

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps). 1 IoCs
  • Removes its main activity from the application launcher 1 IoCs
  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Reads name of network operator 1 IoCs

    Uses Android APIs to discover system information.

  • Suspicious use of android.app.ActivityManager.getRunningServices 22 IoCs
  • Suspicious use of android.telephony.TelephonyManager.getLine1Number 4 IoCs
  • Suspicious use of android.telephony.TelephonyManager.getNetworkCountryIso 2 IoCs
  • Uses reflection 55 IoCs

Processes

  • limb.element.fly
    1⤵
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Reads name of network operator
    • Suspicious use of android.app.ActivityManager.getRunningServices
    • Suspicious use of android.telephony.TelephonyManager.getLine1Number
    • Suspicious use of android.telephony.TelephonyManager.getNetworkCountryIso
    • Uses reflection
    PID:4558

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads