Analysis
-
max time kernel
3822963s -
max time network
113s -
platform
android_x86 -
resource
android-x86-arm-20220310-en -
submitted
20-05-2022 23:40
Static task
static1
Behavioral task
behavioral1
Sample
2d96a7112da0417089ee4b0fea7a0b68661c699a06527dc70b7423cab87e58c9.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
2d96a7112da0417089ee4b0fea7a0b68661c699a06527dc70b7423cab87e58c9.apk
Resource
android-x64-arm64-20220310-en
General
-
Target
2d96a7112da0417089ee4b0fea7a0b68661c699a06527dc70b7423cab87e58c9.apk
-
Size
206KB
-
MD5
34964abf4a2e77a77f65ea8ffb07527e
-
SHA1
d5fe6bc6466145647e4e2ea825b2de8478be0f9a
-
SHA256
2d96a7112da0417089ee4b0fea7a0b68661c699a06527dc70b7423cab87e58c9
-
SHA512
58095d78f2a9fb27e6611b2236e6120cbec93b277bd1be605d6b1d1a425ec3ea3cafa8f32d3d2c6bbc791a44cc5e220efa3046f00835cc116674897413179693
Malware Config
Signatures
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.TEST.android.lvh/files/79.jar --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.TEST.android.lvh/files/oat/x86/79.odex --compiler-filter=quicken --class-loader-context=&com.TEST.android.lvhioc pid process /data/user/0/com.TEST.android.lvh/files/79.jar 5149 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.TEST.android.lvh/files/79.jar --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.TEST.android.lvh/files/oat/x86/79.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.TEST.android.lvh/files/79.jar 5113 com.TEST.android.lvh -
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
com.TEST.android.lvhdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.TEST.android.lvh
Processes
-
com.TEST.android.lvh1⤵
- Loads dropped Dex/Jar
- Uses Crypto APIs (Might try to encrypt user data).
PID:5113 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.TEST.android.lvh/files/79.jar --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.TEST.android.lvh/files/oat/x86/79.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:5149
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/com.TEST.android.lvh/databases/111.dbFilesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
/data/user/0/com.TEST.android.lvh/databases/111.db-journalFilesize
524B
MD559725495c4e2146a0c5938a919300b1e
SHA149fcd6c3813a291cda8537f685b12dda9d08a717
SHA256788340b904d25db2965aad2ae9b145964318be24a3ce3b12dccade44ba59fc8d
SHA512668af4a0c8ef6189c2de7f7cdae1a09574efc1d0284d9ca5333f740c64d5b394a9fd72911a18bd009387233c584d509a27f0a0807160a2515875fa1804706df1
-
/data/user/0/com.TEST.android.lvh/databases/111.db-shmFilesize
8B
MD57dea362b3fac8e00956a4952a3d4f474
SHA105fe405753166f125559e7c9ac558654f107c7e9
SHA256af5570f5a1810b7af78caf4bc70a660f0df51e42baf91d4de5b2328de0e83dfc
SHA5121b7409ccf0d5a34d3a77eaabfa9fe27427655be9297127ee9522aa1bf4046d4f945983678169cb1a7348edcac47ef0d9e2c924130e5bcc5f0d94937852c42f1b
-
/data/user/0/com.TEST.android.lvh/databases/111.db-walFilesize
32KB
MD55f9c1552edb70a397b3089a0f8fa7262
SHA1cf535bc556329c56ded19c1dcbe95c84adfd5edc
SHA256a06f757b8ad1ea304655b495554b6bb5e87d75733aea9456c74edf05c84758bb
SHA512d268564d3dcba21a9a74d6c16dd2754f3b3d5dbc172273b66b2c66c222cc6e7ffa82a3dbbe8d206a01828a69abe97f1d8cf1a38a9db5676af156ecf860cca61b
-
/data/user/0/com.TEST.android.lvh/files/79.jarFilesize
64KB
MD566db1c0c0a6128ffa38316cae6aec11e
SHA1f4b3fdd13f175201533796531fb14191ca42db42
SHA2560fc1ba0e0e975a2cb91b0d167a8c8a8585a68ace17559e1a9d94a7500a01d104
SHA51206204a483c1bcb909b02d658c412b8f258bd0de2fbdcfb4e00f408006f6fe689075f2706335e7ecd9fd106b4dcb542b8895257936150bb7e84ee38893770fee8
-
/data/user/0/com.TEST.android.lvh/files/79.jarMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
/data/user/0/com.TEST.android.lvh/files/79.jarFilesize
136KB
MD535f8715e3bdcf909cb2ea64bdad4b9c7
SHA1f74c051effb9b9394e850f5e11acce70d541a6e8
SHA256299c72eb8f045194ee6aedde86af760e7c11089a933e45233076b26a8e460180
SHA51259dd38a99afda405199b66f4aeb6bd6e2c0ef4dcb8782faa3edb982a3a8336e0ef95eaaadcbb8a30f493ba93a921810ab046e482178e9b5e2a00b1dc26cf211d
-
/data/user/0/com.TEST.android.lvh/files/79.jarFilesize
136KB
MD51d4d27c3683eea7ca2c582711759d960
SHA155bb09a3a8e2febef42eff37db4d06f5b8906cd4
SHA256750d2ad709ab401a3b4c2feaefe36937ee95cd2a5a988e915e141c4b98bc1ccd
SHA5126526f34da1eaa5d207d432537ce38dccf0ae0bf52a36a5c8aaaf7c13b87719eff792a2b2c23647b486b9ce18c118af1ef069d5434f7372a5639f002fbbb76c8c
-
/data/user/0/com.TEST.android.lvh/files/79.jar.x86.flockMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
/data/user/0/com.TEST.android.lvh/files/oat/79.jar.cur.profMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
/data/user/0/com.TEST.android.lvh/files/oat/x86/79.odexMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
/data/user/0/com.TEST.android.lvh/files/oat/x86/79.vdexMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e