Resubmissions

17-01-2021 18:27

210117-cmyktp43ee 10

30-12-2020 05:40

201230-s9z6hjadhj 10

Analysis

  • max time kernel
    295452s
  • max time network
    156s
  • platform
    android_x86
  • resource
    android-x86_arm
  • submitted
    17-01-2021 18:27

General

  • Target

    rwbjmjigjv.apk

  • Size

    205KB

  • MD5

    b46157e537fddb256f8ebf5965edd34b

  • SHA1

    410e4332d470e764e13ab8016cf4cc23fb74f64e

  • SHA256

    7843d056e42bc194275b946226418c1dd1929b4ae9438a20846d4deb67e6682a

  • SHA512

    6446d22573587e28cb67607954ad25221b0d9b03eb131acdb00dae66ecec3695557901fdf19b26417c387c1c9f57e87170a90f975cbdaf39008c96246849f67a

Malware Config

Extracted

DES_key

Signatures

  • Removes its main activity from the application launcher 1 IoCs
  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Reads name of network operator 1 IoCs

    Uses Android APIs to discover system information.

  • Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
  • Suspicious use of android.app.ApplicationPackageManager.getInstalledPackages 2 IoCs
  • Suspicious use of android.net.wifi.WifiInfo.getMacAddress 17 IoCs
  • Suspicious use of android.os.PowerManager$WakeLock.acquire 1 IoCs
  • Suspicious use of android.telephony.TelephonyManager.getLine1Number 59 IoCs
  • Uses reflection 66 IoCs

Processes

  • ngur.qlvem.ofnld
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Reads name of network operator
    • Uses Crypto APIs (Might try to encrypt user data).
    • Suspicious use of android.app.ApplicationPackageManager.getInstalledPackages
    • Suspicious use of android.net.wifi.WifiInfo.getMacAddress
    • Suspicious use of android.os.PowerManager$WakeLock.acquire
    • Suspicious use of android.telephony.TelephonyManager.getLine1Number
    • Uses reflection
    PID:4118

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads