Analysis
-
max time kernel
1209096s -
max time network
165s -
platform
android_x64 -
resource
android-x64-arm64-20220310-en -
submitted
09-06-2022 10:42
Static task
static1
Behavioral task
behavioral1
Sample
Chrome.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
Chrome.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
Chrome.apk
Resource
android-x64-arm64-20220310-en
General
-
Target
Chrome.apk
-
Size
4.4MB
-
MD5
65f634ef24fd686225aa4765fc63fe2b
-
SHA1
fe4a7d079cc00e730412c7a6e0b177829ee58a73
-
SHA256
f4d18662c927380a2d30eba367fafd3746fa137df499cb50d49e591a420aa95d
-
SHA512
1dfd4069dc664d6062c76a49c0925b7bf0ecf7fda8bd345fe5980100bc413f93e2853e0be9e89db03b42de90c0d8017f31c17f73470462345c31d50a7a6c47fe
Malware Config
Signatures
-
Makes use of the framework's Accessibility service. 3 IoCs
Processes:
com.sdblokpzz.epfbyuxgxdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.sdblokpzz.epfbyuxgx Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.sdblokpzz.epfbyuxgx Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.sdblokpzz.epfbyuxgx -
Acquires the wake lock. 1 IoCs
Processes:
com.sdblokpzz.epfbyuxgxdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.sdblokpzz.epfbyuxgx -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.sdblokpzz.epfbyuxgxioc pid process /data/user/0/com.sdblokpzz.epfbyuxgx/f8dd88kiff/t98gtgu9ff8Igtg/base.apk.kotgdyg1.8fU 7052 com.sdblokpzz.epfbyuxgx -
Queries the unique device ID (IMEI, MEID, IMSI).
-
Removes a system notification. 1 IoCs
Processes:
com.sdblokpzz.epfbyuxgxdescription ioc process Framework service call android.app.INotificationManager.cancelNotificationWithTag com.sdblokpzz.epfbyuxgx -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
com.sdblokpzz.epfbyuxgxdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.sdblokpzz.epfbyuxgx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/com.sdblokpzz.epfbyuxgx/f8dd88kiff/t98gtgu9ff8Igtg/base.apk.kotgdyg1.8fUFilesize
1.3MB
MD5e743c25fcad49fa255e23954d61bc5ed
SHA18d63ee14ef3a79d75ad1ac379e9319b6b5b471a2
SHA256e0c7abe1cbefa66bd883f0cceb1e26d219624cbea56e2b0e8c8cd42f59186ce5
SHA51205c4bb5f070465e8e79c9d4f163f79628ab9b691178b6771a2dc20ce723d35888b9b2b7975242362659eed1aadc96968a9cf3efb9f4a640258eb5d957dac6047
-
/data/user/0/com.sdblokpzz.epfbyuxgx/f8dd88kiff/t98gtgu9ff8Igtg/tmp-base.apk.kotgdyg9134183444209442742.8fUMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
/data/user/0/com.sdblokpzz.epfbyuxgx/f8dd88kiff/t98gtgu9ff8Igtg/ytI6kjhj.gfk8MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
/data/user/0/com.sdblokpzz.epfbyuxgx/shared_prefs/multidex.version.xmlFilesize
307B
MD5ac7eb955e609ac3e3965f6cb2c4391bf
SHA1141fc8f7d23673bb5242c9989934564c5118282d
SHA2563cb71b67b2ae7ade66f1268abe083e76440a44bd25bccde466f70b8d79dc13ea
SHA512ffce6753dc6bc702c8774aa8bbf0ed7fb5e16154280d2dbb73d1b1c618e876408be2c6c35ff070f1922191ff2c408b525df26c6a5b8ea19cd1fd0dda38863ff3