Analysis
-
max time kernel
3264407s -
max time network
142s -
platform
android_x86 -
resource
android-x86-arm-20220621-en -
submitted
03-07-2022 05:07
Static task
static1
Behavioral task
behavioral1
Sample
9ea3cf4eed73cc46248438dadf00d222b30cc54343bbe0f45ca2d9aada40d2b5.apk
Resource
android-x86-arm-20220621-en
General
-
Target
9ea3cf4eed73cc46248438dadf00d222b30cc54343bbe0f45ca2d9aada40d2b5.apk
-
Size
6.3MB
-
MD5
3cd8dd2bdaeb1b36fdeff2bfb576848e
-
SHA1
ac08468c2dc62b27bc9ec2337a16ebf6da640e55
-
SHA256
9ea3cf4eed73cc46248438dadf00d222b30cc54343bbe0f45ca2d9aada40d2b5
-
SHA512
904e3c8ac0c8d896149025eb3f70a60279e01be02c7fcf7c155381467081bc6316c08fd021e5817fcbbbc6a74c7b51400b5d58c047a2c1c5c2cd7d4595c4b31f
Malware Config
Signatures
-
Listens for changes in the sensor environment (might be used to detect emulation). 1 IoCs
Processes:
com.Brazle.FreeMakeonedescription ioc process Framework API call android.hardware.SensorManager.registerListener com.Brazle.FreeMakeone
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.Brazle.FreeMakeone/files/Make oneFilesize
93B
MD52edfb9c43301a98f880a5c8ef208de8c
SHA16fb7823bb4e574c40cb6ff44d3ad9b7e9babf5e4
SHA256a7b5c02453f73837bfc8765bf6f1739c3d644e61e21508b4ced023f3655135ae
SHA51241e5bebc677163875c1c278b9ef9971cdf94af3ab5691b151ebd908af5d92bdfa9c84a044bb2c9df02f5745bb857292b81bbd291195879840f06ab54058d05f4