Resubmissions

17-01-2021 18:22

210117-yzgr1acfsn 10

05-01-2021 13:44

210105-tpftmb7x46 10

Analysis

  • max time kernel
    295140s
  • max time network
    158s
  • platform
    android_x86_64
  • resource
    android-x86_64
  • submitted
    17-01-2021 18:22

General

  • Target

    xcejgqilan.apk

  • Size

    205KB

  • MD5

    11f00bf6879962c2a47cf3ac941036ea

  • SHA1

    8ce41bf486fede24004aadc8495c339c7ca06484

  • SHA256

    7886433ed316d47a88323499397e698f560f75689c0c5ce93efb2fd1bc8ece09

  • SHA512

    b49eb7e9aaba2bd8e599ece317a50945bf725b87bb3e62f273a21c31a28d9a0b46ad968691189e784960de624dd6903dd9eb5cb9bc587e79c4409272d4fc3500

Malware Config

Extracted

DES_key

Signatures

  • Removes its main activity from the application launcher 1 IoCs
  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Reads name of network operator 1 IoCs

    Uses Android APIs to discover system information.

  • Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
  • Suspicious use of android.app.ApplicationPackageManager.getInstalledPackages 2 IoCs
  • Suspicious use of android.net.wifi.WifiInfo.getMacAddress 21 IoCs
  • Suspicious use of android.os.PowerManager$WakeLock.acquire 1 IoCs
  • Suspicious use of android.telephony.TelephonyManager.getLine1Number 60 IoCs
  • Uses reflection 67 IoCs

Processes

  • rxio.gmssc.djvug
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Reads name of network operator
    • Uses Crypto APIs (Might try to encrypt user data).
    • Suspicious use of android.app.ApplicationPackageManager.getInstalledPackages
    • Suspicious use of android.net.wifi.WifiInfo.getMacAddress
    • Suspicious use of android.os.PowerManager$WakeLock.acquire
    • Suspicious use of android.telephony.TelephonyManager.getLine1Number
    • Uses reflection
    PID:3547

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads