Analysis
-
max time kernel
2951276s -
max time network
151s -
platform
android_x86 -
resource
android-x86-arm-20220823-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20220823-enlocale:en-usos:android-9-x86system -
submitted
25-11-2022 11:35
Static task
static1
Behavioral task
behavioral1
Sample
70bd38a8024f4815fe901d079b63aadf0cc4c56e00fb2e26bcddaaa74676f07c.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
70bd38a8024f4815fe901d079b63aadf0cc4c56e00fb2e26bcddaaa74676f07c.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
70bd38a8024f4815fe901d079b63aadf0cc4c56e00fb2e26bcddaaa74676f07c.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
70bd38a8024f4815fe901d079b63aadf0cc4c56e00fb2e26bcddaaa74676f07c.apk
-
Size
2.0MB
-
MD5
7a6269f94e155db56ef3ace3d3eedbf9
-
SHA1
b27bb8bf0e2437bfdc725188a2a7668659bf1b9f
-
SHA256
70bd38a8024f4815fe901d079b63aadf0cc4c56e00fb2e26bcddaaa74676f07c
-
SHA512
25619142fea49e0677eea7a5915aa4a61703e84d0f9c07042f315be487980ffce545b0cba443956520a096afa61e0f6185046c539e06d391722e3a14a65e404b
-
SSDEEP
49152:gOILFA0tlO3hIOlo2GyUmSJ4jAIO+t8tvNlLF5TUnVoMdopG7OTPle:GA0rOx2UUmSJ4EIOBtvNlL3Tadog6TP8
Malware Config
Signatures
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
net.lazyer.frozenbubble.wyjxjddescription ioc process Framework API call javax.crypto.Cipher.doFinal net.lazyer.frozenbubble.wyjxjd
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/net.lazyer.frozenbubble.wyjxjd/app_wisdk/ctyxjd.jarMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
/data/user/0/net.lazyer.frozenbubble.wyjxjd/app_wisdk/ctyxjd.jar.x86.flockMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
/data/user/0/net.lazyer.frozenbubble.wyjxjd/app_wisdk/ctyxjd.xmlMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
/data/user/0/net.lazyer.frozenbubble.wyjxjd/app_wisdk/oat/x86/ctyxjd.odexMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
/data/user/0/net.lazyer.frozenbubble.wyjxjd/app_wisdk/oat/x86/ctyxjd.vdexMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
/data/user/0/net.lazyer.frozenbubble.wyjxjd/app_wisdk/wisdk.xmlMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
/storage/emulated/0/.wiyun/wic/operator_namesMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e