Analysis
-
max time kernel
3209147s -
max time network
143s -
platform
android_x64 -
resource
android-x64-20220621-en -
resource tags
androidarch:x64arch:x86image:android-x64-20220621-enlocale:en-usos:android-10-x64system -
submitted
21-08-2022 07:21
Static task
static1
Behavioral task
behavioral1
Sample
4d291ffddce396d078d16f10c35d5e2e.apk
Resource
android-x86-arm-20220621-en
Behavioral task
behavioral2
Sample
4d291ffddce396d078d16f10c35d5e2e.apk
Resource
android-x64-20220621-en
Behavioral task
behavioral3
Sample
4d291ffddce396d078d16f10c35d5e2e.apk
Resource
android-x64-arm64-20220621-en
General
-
Target
4d291ffddce396d078d16f10c35d5e2e.apk
-
Size
3.6MB
-
MD5
4d291ffddce396d078d16f10c35d5e2e
-
SHA1
1d9727aaf55191c9876e7c4b376dc2a6dd027a06
-
SHA256
0892942b07717a4fdef6639d02c56ce6ddb8e599529d299facaeda1c0cb16808
-
SHA512
1157293368632554da526e7795b1761877333e9d8eba34ccb21a45305aa88d58781ab42e5a7dfcd279ed23cc6317c6edf0609a175927551919ef60994da02452
Malware Config
Signatures
-
Loads dropped Dex/Jar 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.cwblsehgz.ochxfcflb/khkjgU8hgy/dga6oI6gbIHjs4j/base.apk.yakhfds1.hkk 5738 com.cwblsehgz.ochxfcflb [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.cwblsehgz.ochxfcflb/khkjgU8hgy/dga6oI6gbIHjs4j/base.apk.yakhfds1.hkk] 5738 com.cwblsehgz.ochxfcflb [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.cwblsehgz.ochxfcflb/khkjgU8hgy/dga6oI6gbIHjs4j/base.apk.yakhfds1.hkk] 5738 com.cwblsehgz.ochxfcflb [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.cwblsehgz.ochxfcflb/khkjgU8hgy/dga6oI6gbIHjs4j/base.apk.yakhfds1.hkk] 5738 com.cwblsehgz.ochxfcflb -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.cwblsehgz.ochxfcflb
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5ec1169d8d6412e6cd1146dbb40833dc1
SHA19376b58dbf56de90045611b176f92ef65578dc67
SHA2566d0e90239201e97f3a1711a2bd32e02cb6d242e078d9484db5188e45f0b15ea7
SHA512d307036b4aa93bcc4b7a6069413fab6bb18e5ddc7a8a951715fb8872b97e47ba0ff42af8ee5f455edb20945fae686165b8ed00f14475f490dc80d37ef891746a
-
Filesize
307B
MD51adf24c770bcdf5dbabe410ce7cc60c5
SHA1c2dc9ad1124f1dd838c4cb65be3d55734c78550f
SHA2566cb999859b9cd4ef083d9b33ac3d60be38223399da541a0889de99b039d196d6
SHA512e5bdd4722e7674ec5d32f2e7175d078085fcc08cef250c7fa1d0a010485334a5f38824225153faeb74dcd1d11036f5a4dc3545b13f15c2131622bcb4e0a724bf
-
[anon:dalvik-classes.dex extracted in memory from /data/user/0/com.cwblsehgz.ochxfcflb/khkjgU8hgy/dga6oI6gbIHjs4j/base.apk.yakhfds1.hkk]
Filesize1.3MB
MD5ec1169d8d6412e6cd1146dbb40833dc1
SHA19376b58dbf56de90045611b176f92ef65578dc67
SHA2566d0e90239201e97f3a1711a2bd32e02cb6d242e078d9484db5188e45f0b15ea7
SHA512d307036b4aa93bcc4b7a6069413fab6bb18e5ddc7a8a951715fb8872b97e47ba0ff42af8ee5f455edb20945fae686165b8ed00f14475f490dc80d37ef891746a
-
[anon:dalvik-classes.dex extracted in memory from /data/user/0/com.cwblsehgz.ochxfcflb/khkjgU8hgy/dga6oI6gbIHjs4j/base.apk.yakhfds1.hkk]
Filesize1.3MB
MD5ec1169d8d6412e6cd1146dbb40833dc1
SHA19376b58dbf56de90045611b176f92ef65578dc67
SHA2566d0e90239201e97f3a1711a2bd32e02cb6d242e078d9484db5188e45f0b15ea7
SHA512d307036b4aa93bcc4b7a6069413fab6bb18e5ddc7a8a951715fb8872b97e47ba0ff42af8ee5f455edb20945fae686165b8ed00f14475f490dc80d37ef891746a
-
[anon:dalvik-classes.dex extracted in memory from /data/user/0/com.cwblsehgz.ochxfcflb/khkjgU8hgy/dga6oI6gbIHjs4j/base.apk.yakhfds1.hkk]
Filesize1.3MB
MD5ec1169d8d6412e6cd1146dbb40833dc1
SHA19376b58dbf56de90045611b176f92ef65578dc67
SHA2566d0e90239201e97f3a1711a2bd32e02cb6d242e078d9484db5188e45f0b15ea7
SHA512d307036b4aa93bcc4b7a6069413fab6bb18e5ddc7a8a951715fb8872b97e47ba0ff42af8ee5f455edb20945fae686165b8ed00f14475f490dc80d37ef891746a