Analysis

  • max time kernel
    1213226s
  • max time network
    39s
  • platform
    android_x86_64
  • resource
    android-x86_64_arm64
  • submitted
    07-05-2021 19:30

General

  • Target

    pithus_sample_f18aba837e86025dfb9bd3fd2c4bf161f679ff1f3d10e7a480d682178051a9b9.apk

  • Size

    6.3MB

  • MD5

    547217d768ca6a46b00fc02f1ab7fb56

  • SHA1

    f68cf2783e026b7ca6d4f577819c206e4258d48b

  • SHA256

    f18aba837e86025dfb9bd3fd2c4bf161f679ff1f3d10e7a480d682178051a9b9

  • SHA512

    926b7761b728057022f0f44aec2048f12a69e6fc4e897f6900897926cbcae19e65bc4eb4438ec5d2a8c9ec097b429f35db29460d52d2861d40d761e70355fffa

Score
10/10

Malware Config

Extracted

AES_key
AES_key

Signatures

  • Checks Android system properties for emulator presence. 1 IoCs
  • Checks known Qemu pipes. 2 IoCs

    Checks for known pipes used by the Android emulator to communicate with the host.

  • Loads dropped Dex/Jar 6 IoCs

    Runs executable file dropped to the device during analysis.

  • Uses reflection 64 IoCs

Processes

  • com.hdmovies.freemovieshd.watchmovies
    1⤵
    • Checks Android system properties for emulator presence.
    • Checks known Qemu pipes.
    • Loads dropped Dex/Jar
    • Uses reflection
    PID:4511

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads