Analysis

  • max time kernel
    3869226s
  • max time network
    160s
  • platform
    android_x64
  • resource
    android-x64-20220310-en
  • submitted
    21-05-2022 12:29

General

  • Target

    414f22419fbeff9ccd22942804f0c2923b13d7f62caa9c90a8b1552a756ff219.apk

  • Size

    2.3MB

  • MD5

    889c507091e43d66a98abceab0ee8088

  • SHA1

    d3cc6c40d8921e44220d640bbf577a87444e01fb

  • SHA256

    414f22419fbeff9ccd22942804f0c2923b13d7f62caa9c90a8b1552a756ff219

  • SHA512

    cc20c8ec7298f7ae052529637477a78d7e75501b0c3530bf8309cf0895006b102d442bf5d21e11339b02c36b7aad2bf8e334cdb6cdfafce7c5d72e50a238554f

Score
7/10

Malware Config

Signatures

  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Reads information about phone network operator.

Processes

  • com.rhmkpij.khjjvk.spvvr
    1⤵
    • Loads dropped Dex/Jar
    PID:6217

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.rhmkpij.khjjvk.spvvr/files/box103.zip
    Filesize

    215KB

    MD5

    e0eb1f920a386479a8554385659af550

    SHA1

    f4f8d3f4618eb2287f4483311fc0a91dc8cf41a9

    SHA256

    0d2800c904603d52ffc9e51c1b07c071f9c92551e3e6b1b3540ff113214deaaa

    SHA512

    81d8f5f08d1672cc89ae0e6e33ad5b22369ef7788d5f48500fbbf66dbdeafddf95e38d2084b603fe8841ad44b6f7b458dba933da1bc747d7374ebd2fda1adae0

  • /data/user/0/com.rhmkpij.khjjvk.spvvr/files/box103.zip
    Filesize

    99KB

    MD5

    bb0cf657c4d22833ad0a4faf5d922110

    SHA1

    86708ef50c5fd321184e1dcba1e22413a121e385

    SHA256

    31c730956e8e9ac870103e99bb6b2d230944fd044d06d90c0e94564da451c8ae

    SHA512

    c5f7a040ad492cd53054cef2501d19cdaed946d6b3cf98a10d5a93e284809602606bca5dd7dc8aae9a674cfe9dda2c6896c7e5427d3d0b115206a967d7feac7d