Analysis
-
max time kernel
2950529s -
max time network
158s -
platform
android_x64 -
resource
android-x64-20220823-en -
resource tags
androidarch:x64arch:x86image:android-x64-20220823-enlocale:en-usos:android-10-x64system -
submitted
25-11-2022 11:15
Static task
static1
Behavioral task
behavioral1
Sample
79f73a660cffff968ec5601e31cb0d6b660f2983c24d224f7bee7d6b35cb7713.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
79f73a660cffff968ec5601e31cb0d6b660f2983c24d224f7bee7d6b35cb7713.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
79f73a660cffff968ec5601e31cb0d6b660f2983c24d224f7bee7d6b35cb7713.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
79f73a660cffff968ec5601e31cb0d6b660f2983c24d224f7bee7d6b35cb7713.apk
-
Size
304KB
-
MD5
3a580c860f8294f4c3fb73a28643d9b6
-
SHA1
32cc87d0081b70d73ac301437c06f273d75491b4
-
SHA256
79f73a660cffff968ec5601e31cb0d6b660f2983c24d224f7bee7d6b35cb7713
-
SHA512
6a5977f3d28b61f34bd114ba2f6d3a51bc9c22f47cd075bc78d6aa2dd7fec2e99202f9bd862e99617d5ec91ae2cbd63892ee248cb468ad3206a2f17e6d6aa93d
-
SSDEEP
6144:hq3wud69YkUm2qF7kGOKZFgahhYmeOh6STo6UlnA5cVZy8aQU+YfnW4MRw:hDC5mX7JOYbYm/MCo6iA5cVZdaQLYjmw
Malware Config
Signatures
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
kko.oujap.yejwldescription ioc process Framework API call javax.crypto.Cipher.doFinal kko.oujap.yejwl
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/kko.oujap.yejwl/shared_prefs/storage.xmlFilesize
144B
MD5843810cf1ba3c8b1ed1eeb5b9ba9b66c
SHA178d8685395e12ef5748558d66e70f08ad54cc717
SHA256d64f1ec955cb12be21f646c1110ec4c6743fdcb9c0f37b299f08e7bd26c02601
SHA512d165f6fdc172c68e26bfef4421cc5a236779f52546aa6130f2543773abbd6fb39f2cadaaeadd9363b088cb47f32ee0a695e0cf57ce49a5e9291939b5c6606c63