Analysis

  • max time kernel
    2770099s
  • max time network
    154s
  • platform
    android_x86
  • resource
    android-x86-arm-20220823-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20220823-enlocale:en-usos:android-9-x86system
  • submitted
    23-11-2022 15:17

General

  • Target

    aecca8a59c1277ac17ed80e040fea70a8aa829b16cbb588378ea021fbb06a6c1.apk

  • Size

    308KB

  • MD5

    98a94d7ea1685b134073859aefaa09e5

  • SHA1

    973b9bc5420ff2c2d66f87f3dfaff9c84d6722c7

  • SHA256

    aecca8a59c1277ac17ed80e040fea70a8aa829b16cbb588378ea021fbb06a6c1

  • SHA512

    06d6c2725513246b77f25fa17725cedcf73213cab881e6b5e5828c638511366982bd7ff4223904a0396807f0aafb9168afd773f3315a6715b836d9c7bfbc5dd8

  • SSDEEP

    6144:FUFtIEU3w96LBy2slPFeMFeNBD+PGHhaOs2zGBTbC65Mr1kUIM:QtRtGyzlPF8BJhaOtzv65wrl

Score
6/10

Malware Config

Signatures

  • Reads information about phone network operator.
  • Uses Crypto APIs (Might try to encrypt user data). 1 IoCs

Processes

  • eld.qhhys.dryod
    1⤵
    • Uses Crypto APIs (Might try to encrypt user data).
    PID:4097

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/eld.qhhys.dryod/shared_prefs/storage.xml

    Filesize

    138B

    MD5

    7fa2b4501fb74e3248f6b3f5f6122692

    SHA1

    c4cc0e4845a1d2f4904d12ada108213ef5ce02a0

    SHA256

    5a95090f76be0cb99a060de5b6ae1751ab06a12449a23f8f81232abf1fe21aa4

    SHA512

    67735a312cb1ba23d6823375416f194fe6d723b4ce8645f97ba166f2772151aa6643e82d5676b0d01293eec1a1e40de86f753b1b22bd14aebb341b5c9dd9ca33