Resubmissions

17-01-2021 18:30

210117-ztwwamvtdx 10

21-12-2020 13:14

201221-jtrt4x4m7j 8

19-12-2020 08:22

201219-c7ryd6cvxa 10

Analysis

  • max time kernel
    295653s
  • max time network
    159s
  • platform
    android_x86_64
  • resource
    android-x86_64
  • submitted
    17-01-2021 18:30

General

  • Target

    arsezudnmo.apk

  • Size

    206KB

  • MD5

    63b113e6499161d359623320788c7376

  • SHA1

    8ac1f83b21b1158081dcd6ff0bb9351cf0d3676e

  • SHA256

    0cc3defcfeb3bc8dfdd9699417522479b866b84dbb4cf5a52f0202f70151b3f4

  • SHA512

    4974971814f1f9843cee0742656ce2d4e66a5350a37e73176574cfff0ef00ed42983d42d765f21ad5cab6520086c3da265ec263efc20c48db0b8b1fd885433bf

Malware Config

Extracted

DES_key

Signatures

  • Removes its main activity from the application launcher 1 IoCs
  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Reads name of network operator 1 IoCs

    Uses Android APIs to discover system information.

  • Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
  • Suspicious use of android.app.ApplicationPackageManager.getInstalledPackages 2 IoCs
  • Suspicious use of android.net.wifi.WifiInfo.getMacAddress 21 IoCs
  • Suspicious use of android.os.PowerManager$WakeLock.acquire 1 IoCs
  • Suspicious use of android.telephony.TelephonyManager.getLine1Number 60 IoCs
  • Uses reflection 66 IoCs

Processes

  • seed.sgcne.vxrbr
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Reads name of network operator
    • Uses Crypto APIs (Might try to encrypt user data).
    • Suspicious use of android.app.ApplicationPackageManager.getInstalledPackages
    • Suspicious use of android.net.wifi.WifiInfo.getMacAddress
    • Suspicious use of android.os.PowerManager$WakeLock.acquire
    • Suspicious use of android.telephony.TelephonyManager.getLine1Number
    • Uses reflection
    PID:3548

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads