Analysis
-
max time kernel
2775422s -
max time network
89s -
platform
android_x64 -
resource
android-x64-20220823-en -
resource tags
androidarch:x64arch:x86image:android-x64-20220823-enlocale:en-usos:android-10-x64system -
submitted
23-11-2022 15:21
Static task
static1
Behavioral task
behavioral1
Sample
8780e349963c4e30602bc7e349c49157c999f7e044a0c30c1d3e0cbf908d423f.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
8780e349963c4e30602bc7e349c49157c999f7e044a0c30c1d3e0cbf908d423f.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
8780e349963c4e30602bc7e349c49157c999f7e044a0c30c1d3e0cbf908d423f.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
8780e349963c4e30602bc7e349c49157c999f7e044a0c30c1d3e0cbf908d423f.apk
-
Size
1.6MB
-
MD5
5816131ee36a5d08686c9ab9babc59c1
-
SHA1
67b42cc66d8562510985ee9c4b3ad7d2447f389a
-
SHA256
8780e349963c4e30602bc7e349c49157c999f7e044a0c30c1d3e0cbf908d423f
-
SHA512
a9c951ee874da0c0ebb37a14baa24cb7b743ca6c63c9c12bcb365eada27c2ffe31b8cf9f4b0f8c2cef6fe345a9f6d14713dd0172496ee3365874408836d6697e
-
SSDEEP
49152:lZqwa/JNrF0jWl/wc3/EP0UIJP/Co8AsH:lcwsNB0KjEPRu3CHJ
Malware Config
Signatures
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
com.android.cbdmdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.android.cbdm
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/com.android.cbdm/files/TDtcagent.dbFilesize
200KB
MD526f9309697349b96cfd80bd300a3138c
SHA1baaa9d4042cf8d37c8f13cee1b4869525b88e7f2
SHA2564ca85b7ab5fe895ed06463b3ab44021b354bbd9bcd27de7846951abe0cb25976
SHA5127d0e332ee6ac3edb047a4c37282c05ef40ed938c03828d6c341ad1759b446b8aa6ae8d2c8f7efae8622731dbc0d22d25190c0d1b3fa64ad205752b239f33910b
-
/data/user/0/com.android.cbdm/files/TDtcagent.db-journalFilesize
1KB
MD58e60abf9925756a9f5b1ef12f77cea3c
SHA1096d59e48e3ba29483389688d8fdabf317f7f244
SHA25675b5051baf18d503ba63ae5d268dbe86c3de4536f941e068ac0154b99de3afd2
SHA512e66cb7015411630d82c0cd672c4aca4c599c44d13bc5a5782d0a132f53245a83300bf7352ec737e511b2f8a696654b86b036a2284a6bf8cbd2c6c7b1bfe52f52
-
/data/user/0/com.android.cbdm/shared_prefs/Params.xmlFilesize
127B
MD56c1ba3c1d2482c6d2d139f1b98cfe81c
SHA1826d52f8dd4fbf441456f92dfd7b4498854ee90f
SHA256fdce2f472746fd16148555fe47bb5d9409fc92b48d23d65dc26f3ea7e0354261
SHA51298d61f776bf9a91738cf7f241c362e2e9a240130375874e4ac2ee215fc0f56faa458077a7b52c2bbd6bfc934be297b1acb6a655b116e3e5a737a07610979e9f4
-
/data/user/0/com.android.cbdm/shared_prefs/Params.xmlFilesize
184B
MD5ef7d32f9d6795464d4a2c910078790fe
SHA1325cab4d3c2860ce2e6bb2193f8dca98c74a9782
SHA2563e23896d5fd84f0a875e14f9e173aff5f25ca9f68616a96579e4e330f0aad833
SHA512788d95307441c9da1d0bf38a801e63d8ba39ba8a233d262bbcf632737e487a7c26af2d156d4be4aa70fab580ebda4dc40c055ce43a8b4d412d03865ba0569696
-
/data/user/0/com.android.cbdm/shared_prefs/Params.xmlFilesize
253B
MD5c022d4e7fada895cb6ac304158dad4b2
SHA160ea6efe4ba3b0961ae6fbd1452033e9b74888a3
SHA256c16dabb81e3b23f87212d62369fb4bd79215b1f8d7ec3b7828ec1083e12ae460
SHA51281e174d6394d42c6ddbe86063b149b61a9c43ce62e1def7680502ccddba6d0c09fddd13c15d55e96d7e049a8a27fb713f0b8a2888d9cba0f1ef1c4e19220f755
-
/data/user/0/com.android.cbdm/shared_prefs/Params.xmlFilesize
307B
MD5b63bc3441c0e149491b375c6a4b3bf29
SHA1e88276ef8616cfbfad69cdc5086caf8d70032004
SHA2567bc0fbaba5233c9d2dbf77f9d02cefee429a6451c50b4ae1fab8d13aa3a5e871
SHA5128bb794d1afe0fb1a63c2a3bd4250be778ca687d6e1d546040d388a7c488d83c893590600b405dd96802584ccb328ba4791016e20ec6aba42537e9eb8e870e833
-
/storage/emulated/0/.tidFilesize
32B
MD57101cee15d2f913695d77b112cafa081
SHA1aaa47f4516feee27d3b8f267bde669e4835da6c2
SHA25695efba4b752480bebfb18a77c05be19e63b00b3badf1a19a00a60a27d21f3877
SHA5120c0e48a2cab25ea291a19842c4f0185549f9d147ec22cf976ecd8e9acd9661a2bad6c8ef2f748590c8f0e7f1fbaf8c6320e83e523d5f948df440ecb4b1125b9c