Analysis
-
max time kernel
3018835s -
max time network
134s -
platform
android_x64 -
resource
android-x64-20220823-en -
resource tags
androidarch:x64arch:x86image:android-x64-20220823-enlocale:en-usos:android-10-x64system -
submitted
26-11-2022 00:57
Static task
static1
Behavioral task
behavioral1
Sample
ec76043c61124761b79d82dc6c818292a33cb92a0c16a753509c63d0dfcaf9f3.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
ec76043c61124761b79d82dc6c818292a33cb92a0c16a753509c63d0dfcaf9f3.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
ec76043c61124761b79d82dc6c818292a33cb92a0c16a753509c63d0dfcaf9f3.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
ec76043c61124761b79d82dc6c818292a33cb92a0c16a753509c63d0dfcaf9f3.apk
-
Size
5.2MB
-
MD5
15629e9111e301d2cad50256b753a232
-
SHA1
9a5218ee62124883d0a6b4acbdcb2734d1d171d7
-
SHA256
ec76043c61124761b79d82dc6c818292a33cb92a0c16a753509c63d0dfcaf9f3
-
SHA512
776ce37f16f7d87be9625613d7248e842c4fe4021d441b43e01379a5f7d66660f6ae60a15490da48870dffb2fe9b7e42c468d6f4fd6af35a77c3385bcd54448b
-
SSDEEP
49152:LnI3jnLJM92eQF7JHvi0/O26Vrkp6OUMk6u6FVtvpHQDzc7pWaiJv5UmWeVAv4UZ:TWjws7ZvIm6w2n7h/+DppFA/M
Malware Config
Signatures
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
name.rjmnpn.jtgnkr.kuptdescription ioc process Framework API call javax.crypto.Cipher.doFinal name.rjmnpn.jtgnkr.kupt