Analysis

  • max time kernel
    586479s
  • max time network
    145s
  • platform
    android_x86
  • resource
    android-x86-arm-20220823-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20220823-enlocale:en-usos:android-9-x86system
  • submitted
    29/10/2022, 05:15

General

  • Target

    5a6ab07fb7d4872f09194c2fd2cb4c7e78fade5d5e8057b0b6a26adf2655aa90.apk

  • Size

    230KB

  • MD5

    d06a74283c3ba13407ce31d84459275d

  • SHA1

    3e2a72a36e5edc8f17ad543880b655bcc0ae1cea

  • SHA256

    5a6ab07fb7d4872f09194c2fd2cb4c7e78fade5d5e8057b0b6a26adf2655aa90

  • SHA512

    f7277304bb571c6ce311389d40cc9209228aa11bf07347555ca14e997025358db64302ec96fdb66187677225bce498ac23faa6c6f444752aa84fe8a024a6072f

  • SSDEEP

    6144:Xmg1X6FtnJEMC5MaxWBySUO0hsMsZNLte:XPXkn7CBxUyStcXSBe

Malware Config

Signatures

  • Reads the content of SMS inbox messages. 1 IoCs
  • Tries to add a device administrator. 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data). 1 IoCs

Processes

  • com.chhuug.tirfd
    1⤵
    • Reads the content of SMS inbox messages.
    • Tries to add a device administrator.
    • Uses Crypto APIs (Might try to encrypt user data).
    PID:4076

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads