Resubmissions

17-01-2021 18:17

210117-2t1gv3dzsj 10

16-01-2021 08:43

210116-fnmwcm13js 10

Analysis

  • max time kernel
    174001s
  • max time network
    156s
  • platform
    android_x86_64
  • resource
    android-x86_64
  • submitted
    16-01-2021 08:43

General

  • Target

    xbafaaflpk.apk

  • Size

    204KB

  • MD5

    4c976607cb1d0c0f3f082ef8dac8f22e

  • SHA1

    98e053c1e63f17622e38d3798f5e65e544e9b490

  • SHA256

    84dace68c129c0babe472e1a14c3fc95e8349cc2854f536ff3e53b0a394cbd2f

  • SHA512

    1082f6c45b16e990b288a81aa974f73a669b331cc0a34ee7511ca3f45322ee9159dffafab520855620e8ffe744e25e9c8b228a58eb0bb8ee62b36e40dfef9e5d

Malware Config

Extracted

DES_key

Signatures

  • Removes its main activity from the application launcher 1 IoCs
  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Reads name of network operator 1 IoCs

    Uses Android APIs to discover system information.

  • Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
  • Suspicious use of android.app.ApplicationPackageManager.getInstalledPackages 2 IoCs
  • Suspicious use of android.net.wifi.WifiInfo.getMacAddress 21 IoCs
  • Suspicious use of android.os.PowerManager$WakeLock.acquire 1 IoCs
  • Suspicious use of android.telephony.TelephonyManager.getLine1Number 60 IoCs
  • Uses reflection 64 IoCs

Processes

  • d.avxebh.nxpr
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Reads name of network operator
    • Uses Crypto APIs (Might try to encrypt user data).
    • Suspicious use of android.app.ApplicationPackageManager.getInstalledPackages
    • Suspicious use of android.net.wifi.WifiInfo.getMacAddress
    • Suspicious use of android.os.PowerManager$WakeLock.acquire
    • Suspicious use of android.telephony.TelephonyManager.getLine1Number
    • Uses reflection
    PID:3549

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads