Analysis

  • max time kernel
    2771505s
  • max time network
    132s
  • platform
    android_x86
  • resource
    android-x86-arm-20220823-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20220823-enlocale:en-usos:android-9-x86system
  • submitted
    23-11-2022 15:27

General

  • Target

    5980970d9e881729130be9099c573f752bc2bbc919226b3b8ab539dcafbdfd26.apk

  • Size

    1.5MB

  • MD5

    c1d3414273c4143844b9ac8ca4afe173

  • SHA1

    962ac3c5d2957bd5b9dbe38712c93579103f84d1

  • SHA256

    5980970d9e881729130be9099c573f752bc2bbc919226b3b8ab539dcafbdfd26

  • SHA512

    8e9ef14a92f6cc53b78e7d0f4b482d2374932b07a457fcdc01f9452869fdbc921cd2401991b7ef6982ec20ea71ddf1604e4eea93307b94054b057c6b4898150b

  • SSDEEP

    24576:goshv8MvUZ4Er1euZf0sIRS2mo4qBllWXMCxfgiA6yxQONQ99ewjmZD7Vkv23xA:+0MvUZ4EbfzIRS2zCXMCxftByxQ/Xewz

Score
8/10

Malware Config

Signatures

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps). 1 IoCs
  • Reads the content of SMS inbox messages. 1 IoCs
  • Tries to add a device administrator. 1 IoCs

Processes

  • com.sdwiurse
    1⤵
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
    • Reads the content of SMS inbox messages.
    • Tries to add a device administrator.
    PID:4058

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.sdwiurse/files/config.properties

    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • /storage/emulated/0/all.zip

    Filesize

    140B

    MD5

    885af8781ddabd249030fc4c14714fcf

    SHA1

    2e10aaf4ad5bb163ddfbf2939240b49a6a994805

    SHA256

    f29ef7c8dd32ded81391539d4596bd274fdb2a390f2b3dce746752934ff1295e

    SHA512

    404aa9ffe8f8ed4e4486e158e31e7ef3157d8dd459d6ac35347fab9e7748636fb104898bfe9fe44c01b2d65d0c39988f45eb0bc4df89c081d472900218c0bd7e

  • /storage/emulated/0/phone001.txt

    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • /storage/emulated/0/temp/sms.txt

    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e