Analysis
-
max time kernel
2826960s -
max time network
150s -
platform
android_x64 -
resource
android-x64-arm64-20220823-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20220823-enlocale:en-usos:android-11-x64system -
submitted
24-11-2022 03:03
Static task
static1
Behavioral task
behavioral1
Sample
e719e41b5cf780cd6b01e9fac9a271c784cbb16641d2a25a8e80ea07f251c0f1.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
e719e41b5cf780cd6b01e9fac9a271c784cbb16641d2a25a8e80ea07f251c0f1.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
e719e41b5cf780cd6b01e9fac9a271c784cbb16641d2a25a8e80ea07f251c0f1.apk
-
Size
2.9MB
-
MD5
8e1b7b85ed4f8bb09b443fb26bf0d662
-
SHA1
34cd1c302cb236a64d6e629a5cd8607635e5177b
-
SHA256
e719e41b5cf780cd6b01e9fac9a271c784cbb16641d2a25a8e80ea07f251c0f1
-
SHA512
0d3acdfbcd95b83cfbf00ad7ed44abecdf9d91c01203bfbb2c0231026c2489db47c30592a106ed97f6a08515de22d65b9acd6f1f175286f38f058c2d81f777b9
-
SSDEEP
49152:W8GTkIpRVqFJ/qedfviwcE8A+zBnKMpdMHYkwkTkkypVEF8RNtw2LBNl7KqyBfGz:W8GV6d3v58A+ZKZHb1TBGEF4tpFNxlae
Malware Config
Signatures
-
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
org.thoughtcrime.securesms:remotedescription ioc process Framework API call javax.crypto.Cipher.doFinal org.thoughtcrime.securesms:remote
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5c6a59a2d2188403510c2e4b048430cab
SHA15684b541a8e8103ed575c587786deec71e5331e3
SHA256bb451e51a4ea68c91e55c38f3c63e3adfa0bedb7ed4134e9bf82b95ea2e8afb7
SHA512eff15ef6f8721cbb7ed5a14bf601ab4250d22d7907588c54b38f29c98c0dc1dcdda02c78117b51258a61db3bf330a6063f69c7156fe64f176c9f12b869679eeb
-
Filesize
524B
MD578ca59fbe8618d3855dc43d02b395b7b
SHA1096fbc7ee5ee87e6350049aa43e6e2529aa4bc60
SHA2561909c530f23c70647a4315bc8593f844a2744bf924cc059aff34f19093f2a473
SHA5126546384e11b3f17559d6a0e8d503e9d0e53914fd76fe266baccb576ed33dc2515e4ed747ea633b5f58567e307655419a099b59773ad39714592d6b22c4500125