Analysis
-
max time kernel
3194015s -
max time network
141s -
platform
android_x86 -
resource
android-x86-arm -
submitted
03/02/2022, 06:56
Static task
static1
Behavioral task
behavioral1
Sample
924e8a1c0d7fba2b069b5ce514c45d0835c474a4ce146263cd1d27d405904420.apk
Resource
android-x86-arm
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
924e8a1c0d7fba2b069b5ce514c45d0835c474a4ce146263cd1d27d405904420.apk
Resource
android-x64-arm64
0 signatures
0 seconds
General
-
Target
924e8a1c0d7fba2b069b5ce514c45d0835c474a4ce146263cd1d27d405904420.apk
-
Size
6.8MB
-
MD5
f07b8cc1e331ec181031a0d90fbffb85
-
SHA1
f31c67ccc0d1867db1fbc43762fcf83746a408c2
-
SHA256
924e8a1c0d7fba2b069b5ce514c45d0835c474a4ce146263cd1d27d405904420
-
SHA512
e2fdf39bdc5b3861b3185a575470e5612ec9a99047c2ef1ab499415872d007e6acf54b4e4fe155f27b905a6e8feb58bb44479b5080c5cf31266dded1541e3520
Score
10/10
Malware Config
Signatures
-
Filecoder.C
A ransomware family that spreads to other victims via SMS.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal net.south.seven