Analysis
-
max time kernel
2826512s -
max time network
18s -
platform
android_x64 -
resource
android-x64-arm64-20220823-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20220823-enlocale:en-usos:android-11-x64system -
submitted
24-11-2022 02:54
Static task
static1
Behavioral task
behavioral1
Sample
bade37d72738f13b8a4878812a13c2501e2826a6fb17a5bb78dc130a27cff660.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
bade37d72738f13b8a4878812a13c2501e2826a6fb17a5bb78dc130a27cff660.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
bade37d72738f13b8a4878812a13c2501e2826a6fb17a5bb78dc130a27cff660.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
bade37d72738f13b8a4878812a13c2501e2826a6fb17a5bb78dc130a27cff660.apk
-
Size
1.7MB
-
MD5
af8381775684f95103a7f26c68c63785
-
SHA1
db5d64721e8994c0b5d361d389faa2f4abb9c673
-
SHA256
bade37d72738f13b8a4878812a13c2501e2826a6fb17a5bb78dc130a27cff660
-
SHA512
96b98536ae687f90927966ea0245185f5fbe74e278ac9adba0b34accb5e476ab5b7d885005e747bfa424e50aa0a039bd241566e0dc073d5a08dfd35783ca7dd7
-
SSDEEP
49152:TKHePmxkUmzF3qFxvUZ4VG/SWqM0HpqytLbfz7Hza:T8xRmzFaveODTUyhzHG
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps). 1 IoCs
Processes:
com.sdwiursedescription ioc process Framework service call android.content.pm.IPackageManager.getInstalledApplications com.sdwiurse -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.sdwiurseioc pid process /data/data/com.sdwiurse/x.zip 4402 com.sdwiurse -
Reads the content of SMS inbox messages. 1 IoCs
Processes:
com.sdwiursedescription ioc process URI accessed for read content://sms/inbox com.sdwiurse -
Tries to add a device administrator. 1 IoCs
Processes:
com.sdwiursedescription ioc process Intent action android.app.action.ADD_DEVICE_ADMIN com.sdwiurse -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
com.sdwiursedescription ioc process Framework API call javax.crypto.Cipher.doFinal com.sdwiurse
Processes
-
com.sdwiurse1⤵
- Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
- Loads dropped Dex/Jar
- Reads the content of SMS inbox messages.
- Tries to add a device administrator.
- Uses Crypto APIs (Might try to encrypt user data).
PID:4402
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
601KB
MD512d57e80baae8a3b2647b0a95d44c4eb
SHA1bb335d082c3a741d9f866da696772f3d4b2490d7
SHA256f7551c50aefaafe8e6a402f9dc16a7eaf8557a9a8f452eac907212439282fc80
SHA512d2a703de4e7a8d5fd821c556dfbe21d501725bca54d10c2ca8a8e3714508a0182f5f9bab6f64c6d907fca2a8a20d4cc194ecea44fa162ee2f38cca7f20b097bc
-
Filesize
2.2MB
MD5efc71f1b48a0fe6e857bf3fedbb9861e
SHA16585946f603dfa7b3cae3694213571a1ed9d6b97
SHA256234fe275004216098c99de71a3ceadb331d395ca06e72e354d73b111b74672ba
SHA5122ab7fa3e48621ff036059f5d0a90500c3bfa124d5f857c90f9541bb33d8d4db87bc0b4a6176d1cd045c3cdc99621c7fc99ea7a91b4453221611126f6ef88b3ad
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e