Analysis

  • max time kernel
    2573902s
  • platform
    android_x86
  • resource
    android-x86-arm
  • submitted
    19-10-2021 16:37

General

  • Target

    6efba672aed4b91837758ee91b5c7bdc632cabd64df923fc702b5de24159bf19.apk

  • Size

    6.3MB

  • MD5

    f990e3040e13821787b24d8b70211171

  • SHA1

    42420b60bde4b052be9658e1c82451592ee15da8

  • SHA256

    6efba672aed4b91837758ee91b5c7bdc632cabd64df923fc702b5de24159bf19

  • SHA512

    e52c4977f7bbe3cc858398cbe44c54aa654702aaa61a348df95b044a3797c753cb535bc64cb9c5183e48bccc48e5c61c7ad5b15f38fe638bb2509e89c540cc9f

Score
6/10

Malware Config

Signatures

  • Reads information about phone network operator.
  • Uses Crypto APIs (Might try to encrypt user data). 1 IoCs

Processes

  • com.aio.downloader
    1⤵
    • Uses Crypto APIs (Might try to encrypt user data).
    PID:4834
    • com.aio.downloader
      2⤵
        PID:4955
      • ps
        2⤵
          PID:4955
      • com.aio.downloader:aio
        1⤵
          PID:5008
        • com.aio.downloader:daemon
          1⤵
            PID:5023
          • com.aio.downloader:remote
            1⤵
              PID:5165

            Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads