Analysis
-
max time kernel
268810s -
max time network
296s -
platform
android_x86 -
resource
android-x86-arm -
submitted
04-08-2021 07:11
Static task
static1
Behavioral task
behavioral1
Sample
D9AEA4CC97508BD71A7FBD88AC72A4097811A7A9DDA096BB7CC1D75F477FD6C0.apk
Resource
android-x86-arm
General
-
Target
D9AEA4CC97508BD71A7FBD88AC72A4097811A7A9DDA096BB7CC1D75F477FD6C0.apk
-
Size
1.5MB
-
MD5
f2b54eda7c3e19c4e429d7adb1b7560c
-
SHA1
9725af7718f750ae4d6eebd80b126f9bdfd1d5ea
-
SHA256
d9aea4cc97508bd71a7fbd88ac72a4097811a7a9dda096bb7cc1d75f477fd6c0
-
SHA512
3865725faffa5ed8ed8b17a9e4842ab3f32827066eb882be4b29fd5b7ed30a3ecb6a937e8959711e5fd64711f6e7740983f0a2c76dc3883c74d3360f8e561c50
Malware Config
Signatures
-
Uses reflection 5 IoCs
Processes:
com.example.chat_app_securii3772021description pid process Acesses field sun.misc.Unsafe.theUnsafe 4678 com.example.chat_app_securii3772021 Invokes method sun.misc.Unsafe.allocateInstance 4678 com.example.chat_app_securii3772021 Acesses field sun.misc.Unsafe.theUnsafe 4678 com.example.chat_app_securii3772021 Invokes method java.lang.Throwable.initCause 4678 com.example.chat_app_securii3772021 Invokes method java.lang.Throwable.initCause 4678 com.example.chat_app_securii3772021
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/com.example.chat_app_securii3772021/shared_prefs/com.example.chat_app_securii3772021_preferences.xml
MD548c8c333fcada27fc6aa37da24c99c67
SHA17d9800b20f7488e8c386a80bf57ac7d7b3c4b868
SHA2569fa80a077a6b746c508b5199c92734f11852b3618dc4220218450c8b11f38bb2
SHA512e41735eed80db952c5ecf39710909d279173c95a61a66290123c776f568c156c93762f66eb5e4b81793f5c73d022380100ea58447d767dbf5a96f7766fea0efc