Resubmissions
21-07-2022 15:40
220721-s4kl8agdh4 1020-07-2022 04:04
220720-em11zscbgr 817-06-2022 11:31
220617-nmpsdsbgfp 8Analysis
-
max time kernel
432638s -
max time network
133s -
platform
android_x86 -
resource
android-x86-arm-20220621-en -
submitted
20-07-2022 04:04
Static task
static1
Behavioral task
behavioral1
Sample
e38d7ba21a48ad32963bfe6cb0203afe0839eca9a73268a67422109da282eae3.apk
Resource
android-x86-arm-20220621-en
Behavioral task
behavioral2
Sample
e38d7ba21a48ad32963bfe6cb0203afe0839eca9a73268a67422109da282eae3.apk
Resource
android-x64-arm64-20220621-en
General
-
Target
e38d7ba21a48ad32963bfe6cb0203afe0839eca9a73268a67422109da282eae3.apk
-
Size
2.9MB
-
MD5
db253c49fa9375e6eaa7f23661c58554
-
SHA1
527141e1ee5d76b55b7c7640f7dcf222cb93e010
-
SHA256
e38d7ba21a48ad32963bfe6cb0203afe0839eca9a73268a67422109da282eae3
-
SHA512
e15c29a45813977896487240692c5286053ca4e63f8da92709e4ea56ec354a039fcd5fe8168076da9d2e718cd89704e117e4ea690f5102383253f94f24ac362d
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps). 1 IoCs
description ioc Process Framework service call android.content.pm.IPackageManager.getInstalledApplications com.androidservices.support -
Requests cell location 2 IoCs
Uses Android APIs to to get current cell location.
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getCellLocation com.androidservices.support Framework service call com.android.internal.telephony.ITelephony.getAllCellInfo com.androidservices.support -
Acquires the wake lock. 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.androidservices.support -
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.androidservices.support
Processes
-
com.androidservices.support1⤵
- Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
- Requests cell location
- Acquires the wake lock.
- Requests disabling of battery optimizations (often used to enable hiding in the background).
PID:4066
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
524B
MD5ea0c47a88451e63116cd6843b84583ea
SHA138b67ae6725b7b5ddc20d96773a695e6d9313853
SHA256749020b06d8bc1ba7e6beda180f7a542e1367cf42f365a57b71f0afdf1aef784
SHA512399a8961f59627b7611b10f060540bbf4e7417e26ed9114e34b43921796b1fc3e55ccd8801f2de4e70447868ed4de917bd0bdce77c73db99d9458531747e3d37
-
Filesize
8B
MD57dea362b3fac8e00956a4952a3d4f474
SHA105fe405753166f125559e7c9ac558654f107c7e9
SHA256af5570f5a1810b7af78caf4bc70a660f0df51e42baf91d4de5b2328de0e83dfc
SHA5121b7409ccf0d5a34d3a77eaabfa9fe27427655be9297127ee9522aa1bf4046d4f945983678169cb1a7348edcac47ef0d9e2c924130e5bcc5f0d94937852c42f1b
-
Filesize
52KB
MD578404d969390237d9ea4c45966bdd277
SHA1b328bb3b30f4088c768ca8eb753ed709b616bcf2
SHA2568dc16c79dfcbd4a0acb8109796bef839c18440d1fcfabcb4e568607224f4457e
SHA5123992ed9a6b371dc4c710a7c192a558fc950888f9a1f6721a3674b03e221e7b436925bf6bfa6206c3aab37f68fe0b14c9a69d0ffe81183c5d02b421374ad1311e
-
Filesize
125B
MD5e389f0236514faa939cefa744dba6831
SHA1c1d942d204b422a556dafd9eec58a3bc3f7f4908
SHA25668cb9154e739e966f5bbcd7f60e14b0c4a90ee6cc38487fd183632b49d3e863e
SHA512f2db116f05f6374bf91b91c248852ba8a6ea67afa820d4c3b84f9e2863ddb914d774a35a6ae52ceb0975a3c98edc0b3b44982b1ff82284f214ede5e8fde2b33c
-
Filesize
171B
MD56308d359b8a45fade2af41f9f94968ed
SHA1074ba7207eda71f13ca7e930bda8609c92188345
SHA25679cea765eb6dae3c0d620786a682a715f26294ad2461a6ddc3d6157a1cec6100
SHA512877a9c6707c03d7f310e59b1f2423bdff14c3ef6115a1536b77fa5631a84535b9d8e1e7e779054583b2403530f7a26dd8f89ea20eafa92a296d80d98f941c402
-
Filesize
302B
MD57f97a0cc17cfd713e3a4ec979b0c9d62
SHA1d05345c75b3263e6d4be274f86f1104f3cf12593
SHA256fa5c79c66078e4cc31347e1f00a279de568fdecf6877cfa720c4e151de4aad88
SHA51216a729b2a326bb00e7e5e2907ad687af07108859281d646800b0e1bbec035442705b37d8701fc67b98329abbbc841d32abc1959f381a8a3fe7ee5d3baac2d320
-
Filesize
128B
MD50e777fa46dc7b378b14a465da934467c
SHA1ab7497b8b32d70c9fc2a5203ab618920d0601253
SHA25663b2de8ef589db15b161ed905df89532d0b8ecdaeccf08f4771a4a2206089eac
SHA512f43b46b82842ea2823ebcef50b7677e44c18675b88596e7abc6c090759af93b784c81e74f0f43b7649fa36c5582dc33338c6eeb7f5ef42d8967ad81d54e601e6