Analysis

  • max time kernel
    586497s
  • max time network
    149s
  • platform
    android_x64
  • resource
    android-x64-20220823-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20220823-enlocale:en-usos:android-10-x64system
  • submitted
    29/10/2022, 05:15

General

  • Target

    5a6ab07fb7d4872f09194c2fd2cb4c7e78fade5d5e8057b0b6a26adf2655aa90.apk

  • Size

    230KB

  • MD5

    d06a74283c3ba13407ce31d84459275d

  • SHA1

    3e2a72a36e5edc8f17ad543880b655bcc0ae1cea

  • SHA256

    5a6ab07fb7d4872f09194c2fd2cb4c7e78fade5d5e8057b0b6a26adf2655aa90

  • SHA512

    f7277304bb571c6ce311389d40cc9209228aa11bf07347555ca14e997025358db64302ec96fdb66187677225bce498ac23faa6c6f444752aa84fe8a024a6072f

  • SSDEEP

    6144:Xmg1X6FtnJEMC5MaxWBySUO0hsMsZNLte:XPXkn7CBxUyStcXSBe

Score
5/10

Malware Config

Signatures

  • Uses Crypto APIs (Might try to encrypt user data). 1 IoCs

Processes

  • com.chhuug.tirfd
    1⤵
    • Uses Crypto APIs (Might try to encrypt user data).
    PID:4760

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads