Analysis
-
max time kernel
2375251s -
max time network
98s -
platform
android_x86 -
resource
android-x86-arm-20220621-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20220621-enlocale:en-usos:android-9-x86system -
submitted
11-08-2022 15:41
Behavioral task
behavioral1
Sample
36022a7280f87689ed1844c312463629.apk
Resource
android-x86-arm-20220621-en
Behavioral task
behavioral2
Sample
36022a7280f87689ed1844c312463629.apk
Resource
android-x64-20220621-en
Behavioral task
behavioral3
Sample
36022a7280f87689ed1844c312463629.apk
Resource
android-x64-arm64-20220621-en
General
-
Target
36022a7280f87689ed1844c312463629.apk
-
Size
780KB
-
MD5
36022a7280f87689ed1844c312463629
-
SHA1
8cae26c899440f890a8faca2e63ba42c0195cd3b
-
SHA256
d96f9eafdc3c44611004ac151ae51cdff7a7fa41555389fd36479de442b400a0
-
SHA512
c8b26d40e7fe6b510a0df967bc255243e25bf80408c75ec03f8418729312fc426ce86ea55dd4e1df4f4cc701874e022ccee404a0ec4fef12488cbdf5ee5d4a6a
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps). 1 IoCs
description ioc Process Framework service call android.content.pm.IPackageManager.getInstalledApplications com.android.tester
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105B
MD5e63f23e43db92cc0f8d1b9f33c0b5ef4
SHA1698a2c2c6bf476b34e16119d0448019a23143faf
SHA2563bfc5c2721429fbb7932d1889293b84ac73985d66e4c25b11bd491b7afeff2b4
SHA5126ac2931df68ae7d7c6ab663bcaa611660887b3c2a0a9e56e86887ae17fdcb8b9f4fe90613b83affc4356d9041f0d01a280586f7953f828d03bbb1ee5031423b5
-
Filesize
85B
MD5a473b524dee38a006b69c6274ee34dc0
SHA11c58def6ae4b80c8fdbd2b31a5f732ec6e25c1d5
SHA2563e96d4836e1bce946df71ea18841592a7f7624969cbb6eccdb0ef14f4afdd01f
SHA5123a1d849a3f8756625bc3d6aeaed103fdc15270238eb1e775f5b87717036c6afded974240cd5702cc7b31d258487d50c0d68a6442309a835342715bc3c824ca20