Analysis
-
max time kernel
3019323s -
max time network
18s -
platform
android_x64 -
resource
android-x64-arm64-20220823-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20220823-enlocale:en-usos:android-11-x64system -
submitted
26-11-2022 00:59
Static task
static1
Behavioral task
behavioral1
Sample
386c047906a283096643d1599269ad8484d0d6e219699fc308a9432e7ff27e79.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
386c047906a283096643d1599269ad8484d0d6e219699fc308a9432e7ff27e79.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
386c047906a283096643d1599269ad8484d0d6e219699fc308a9432e7ff27e79.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
386c047906a283096643d1599269ad8484d0d6e219699fc308a9432e7ff27e79.apk
-
Size
1.5MB
-
MD5
952bb8f873159c350109926e60911e22
-
SHA1
662fe5d7740b86ed54eb6299a830cb036d138f47
-
SHA256
386c047906a283096643d1599269ad8484d0d6e219699fc308a9432e7ff27e79
-
SHA512
24127112af542417e68736cbff7b2156c07230e022ba63bc7ac85aed4e1d9e2c4d0a83d4506b43b0a95f48762b511695fda4a74330105d6f609213848dd1637a
-
SSDEEP
24576:A9UhjlaZIcYPplPZHTWvW9G0OHYuE/ECBLezNNBC07qL3YkzxJKfPOPPl1+:0UhZaSpzPhTWvGlOHS8EQfczL3tzxJnS
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.xeqh.xjnx.bucmioc pid process /data/user/0/com.xeqh.xjnx.bucm/app_tjc/joy.jar 4633 com.xeqh.xjnx.bucm -
Requests dangerous framework permissions 9 IoCs
Processes:
description ioc Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE Allows an application to read SMS messages. android.permission.READ_SMS Allows an application to send SMS messages. android.permission.SEND_SMS Allows an application to receive SMS messages. android.permission.RECEIVE_SMS Allows an application to monitor incoming MMS messages. android.permission.RECEIVE_MMS Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE Allows an application to see the number being dialed during an outgoing call with the option to redirect the call to a different number or abort the call altogether. android.permission.PROCESS_OUTGOING_CALLS Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
com.xeqh.xjnx.bucmdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.xeqh.xjnx.bucm
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD575ba605bcfe18a0b5f3f6f883f25d423
SHA1387cbab78be74a9a98d66f622f5d17d808af7163
SHA2560ade33f2144d84999286e47a59693634482f23ad028c1ed408963a843f9bca44
SHA512b3d43728f4c91f3422ff9b120e2669d4b9ab13bb85c538b5d0ae342073577ec671255221165592efd674dc8e6cc10fde0dd7b1fe680e41c37a5d35572ad5bf5e
-
Filesize
135KB
MD5b6dfe0e23cf40553349b3df37d5be11a
SHA1ac89b62afbd460f9aeb8a708dbf36df7f756c1ad
SHA256c67629746eb7eb4203a24e4843c824ff0e7eefd3905003f2790ce90c08dfaa29
SHA5121c944593a77d1af298e6fd8e9641958cb75c15c9ec697d3d72d1e9a0bf7c32529c50808a185fea9292af532d1c04dc688b32f37dea3f1a8cd16402d19b1b78be
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
66KB
MD5a583245803ebb7c627f6c5afe73dea3d
SHA18e0d18478a5230bf537580181abbbf80d81c65b9
SHA256764b3505b93a104a1dc63b041d0256f8fccf8de928de562b112aa0807830bf80
SHA512ed2dc92f657a0fb7ba68034d0504e7f0afb325b765c4dfa522918d65ffe126e058dfea1b910410c5f334e8aad17eadcf28ba4fff04067148eaf1195dd1a2ddf6
-
Filesize
303B
MD5d8de6910c0a6ae11c4a4a4bc31bd5314
SHA180a239b266d52073873f4f2b450f0e3b20ff6622
SHA2569894f6ac814212a02218e4448db53c3d4fc0a8f0a8936e2bf6e5464638fb47a9
SHA512a210bf5c796e9b5addfbb363ba3a636e7b29f3fd5d640a3c852ad0aa5528fc1b5da68eb3732a14191a1b9149940df0872781fd157bb22d42f50a8ec9541c5267
-
Filesize
1.1MB
MD53fdd124efbfe29d723bf494cf337194f
SHA1678568018147a4e05799abf95e050df2f8846673
SHA25630013f3d0974cde5546c20953f6bae9d7956e786bfd8bd347c729f192ad86b49
SHA5120fbfea4ae96fc80f9e38927bb4291a69aaba638f3a81bd206f9afb376e704892f9d425d456f38df22e7f6a28e2c47f80fb892e5233de9b15dcf1c369c094d268
-
Filesize
1.1MB
MD507484dd4e0e3678360d9a7f0806572af
SHA18da01bfd56774f036c1698d4a55fd1a0c4b1aac8
SHA2569f347fb2ee495d8f107a11114371cc06d0980ed4a11d71572599b7f23c0e6800
SHA5120b9532b7ed90be4d4d47aef391b3fda4e30e8efb963dba47aee2cb9a15f38a936026067e04807afe6c4724b9ba1a5571f338724d3e8156aeb8c92f3cc2d76506