Resubmissions

28-07-2022 16:30

220728-tzx77ahhep 10

14-09-2021 07:34

210914-jd4sqsaccm 8

Analysis

  • max time kernel
    1168612s
  • max time network
    165s
  • platform
    android_x64
  • resource
    android-x64-arm64-20220621-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20220621-enlocale:en-usos:android-11-x64system
  • submitted
    28-07-2022 16:30

General

  • Target

    AntiSPAM (3).apk

  • Size

    1.7MB

  • MD5

    ed63a9c22b2a6d39f11dfcee8925d306

  • SHA1

    7f6ccdd0eed3464156d7dd8a5feceec4592fbf12

  • SHA256

    80443ff27c7d665e1d9db78ce70e67478c2a2f47db4f84af7ba4db85c0ead677

  • SHA512

    5b97b075d492f8efe8ab25279a8b1d0bcdeb41f54785de677fbc4ce0ff9037a27b4def8c11f9b76072fa654a84ec2d8bc6185d38785af62492a8a0fa7e872bfc

Score
8/10

Malware Config

Signatures

  • Makes use of the framework's Accessibility service. 1 IoCs
  • Acquires the wake lock. 1 IoCs

Processes

  • b4a.example
    1⤵
    • Makes use of the framework's Accessibility service.
    • Acquires the wake lock.
    PID:4538

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/b4a.example/files/_trv

    Filesize

    12B

    MD5

    abdbb534c848c7edfb4a407c25b29902

    SHA1

    62380bdc3037cb5df6c3fb780aaf53073506ba31

    SHA256

    dacfe86fd73d7f9ff41e66a923211c722392d0fa0b838b9a6bfcb0d0e45379d4

    SHA512

    506edaee43849f8ee043930f13b45f53b80d783bb9fa1b9393fe32e0ddea61f5cb31a57d4d1b811a0d2fc6d15dcc0a8f7b1aedd288af328e032ed25884c14bbd

  • /data/user/0/b4a.example/files/me_device.json

    Filesize

    157B

    MD5

    1a1c8211854b38a8fd3ad69b84871aae

    SHA1

    5a39b03b319a779c66f71cde0ebf3aecd2fc3ba2

    SHA256

    68f34599cf44d6280fb1a5d935a253edbbb16f78b8d08f3f1b43fccf4da8e5a5

    SHA512

    04f2e021ecf839452fc089b95f749692cbf67dbbe27d479346a3de1fac9f40ac3b24111f57d922010a67ab0987419386e2112f47bb3dc1f4526671faaf392e87