Analysis
-
max time kernel
2763729s -
max time network
159s -
platform
android_x64 -
resource
android-x64-arm64-20220621-en -
submitted
27-06-2022 10:32
Static task
static1
Behavioral task
behavioral1
Sample
36022a7280f87689ed1844c312463629.apk
Resource
android-x86-arm-20220621-en
Behavioral task
behavioral2
Sample
36022a7280f87689ed1844c312463629.apk
Resource
android-x64-20220621-en
Behavioral task
behavioral3
Sample
36022a7280f87689ed1844c312463629.apk
Resource
android-x64-arm64-20220621-en
General
-
Target
36022a7280f87689ed1844c312463629.apk
-
Size
780KB
-
MD5
36022a7280f87689ed1844c312463629
-
SHA1
8cae26c899440f890a8faca2e63ba42c0195cd3b
-
SHA256
d96f9eafdc3c44611004ac151ae51cdff7a7fa41555389fd36479de442b400a0
-
SHA512
c8b26d40e7fe6b510a0df967bc255243e25bf80408c75ec03f8418729312fc426ce86ea55dd4e1df4f4cc701874e022ccee404a0ec4fef12488cbdf5ee5d4a6a
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps). 1 IoCs
description ioc Process Framework service call android.content.pm.IPackageManager.getInstalledApplications com.android.tester
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105B
MD5e63f23e43db92cc0f8d1b9f33c0b5ef4
SHA1698a2c2c6bf476b34e16119d0448019a23143faf
SHA2563bfc5c2721429fbb7932d1889293b84ac73985d66e4c25b11bd491b7afeff2b4
SHA5126ac2931df68ae7d7c6ab663bcaa611660887b3c2a0a9e56e86887ae17fdcb8b9f4fe90613b83affc4356d9041f0d01a280586f7953f828d03bbb1ee5031423b5