Analysis

  • max time kernel
    682927s
  • max time network
    166s
  • platform
    android_x64
  • resource
    android-x64-20220310-en
  • submitted
    03-06-2022 06:45

General

  • Target

    cda1ab5a5513eb43cba36ec00d6f1f474f9df05ef436a8e4bdad338c0214325f.apk

  • Size

    257KB

  • MD5

    51f388f9ca606812d7fb4d5330e42ce7

  • SHA1

    bb8cd6250aea882e6bf6b5ae2b2c70a7f194fddd

  • SHA256

    cda1ab5a5513eb43cba36ec00d6f1f474f9df05ef436a8e4bdad338c0214325f

  • SHA512

    2eab4791bd6ab83e79269129f810753ac707b9e494ee2a8da7c9b32adedb5718a98573fd5553632cce15cd200293947699a5c232b118ae2702bf8f1475750248

Score
6/10

Malware Config

Signatures

  • Reads information about phone network operator.
  • Listens for changes in the sensor environment (might be used to detect emulation). 1 IoCs

Processes

  • apps.mukaddema.koyunculuk
    1⤵
    • Listens for changes in the sensor environment (might be used to detect emulation).
    PID:6195

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads