Analysis

  • max time kernel
    3019246s
  • max time network
    14s
  • platform
    android_x64
  • resource
    android-x64-20220823-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20220823-enlocale:en-usos:android-10-x64system
  • submitted
    26-11-2022 00:58

General

  • Target

    e361717e7f7cb7e6eeffb804f76b6de8a6c03ffd33258799e068676d92fd8a43.apk

  • Size

    1.4MB

  • MD5

    1f61a2513c4acd2331b1c2148d100988

  • SHA1

    968b9c319f5784222e2f007d9dad2ecb060675f0

  • SHA256

    e361717e7f7cb7e6eeffb804f76b6de8a6c03ffd33258799e068676d92fd8a43

  • SHA512

    780731d2bf2ba8bd3b908c20c37528a222990dde460d37e62de5402cd7e5379c7d165d878aea5c3dae770ed5426ce5ea6b55aed45ea0e328b6d9bd1dc61e4a3b

  • SSDEEP

    24576:Y+Ss12hsuIjIJEqKqUQGn0PgBpxHwrTs3nzJaUV4DK+nOl2lBa4xJKH/FgR4CXcP:sdhhvG0Pgd+OtPwlBa4xJUQI

Score
7/10

Malware Config

Signatures

  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Requests dangerous framework permissions 9 IoCs
  • Uses Crypto APIs (Might try to encrypt user data). 1 IoCs

Processes

  • com.lnqm.isxy.udni
    1⤵
    • Loads dropped Dex/Jar
    • Uses Crypto APIs (Might try to encrypt user data).
    PID:4756

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.lnqm.isxy.udni/app_tjc/djoy.jar
    Filesize

    66KB

    MD5

    75ba605bcfe18a0b5f3f6f883f25d423

    SHA1

    387cbab78be74a9a98d66f622f5d17d808af7163

    SHA256

    0ade33f2144d84999286e47a59693634482f23ad028c1ed408963a843f9bca44

    SHA512

    b3d43728f4c91f3422ff9b120e2669d4b9ab13bb85c538b5d0ae342073577ec671255221165592efd674dc8e6cc10fde0dd7b1fe680e41c37a5d35572ad5bf5e

  • /data/user/0/com.lnqm.isxy.udni/app_tjc/joy.jar
    Filesize

    135KB

    MD5

    b6dfe0e23cf40553349b3df37d5be11a

    SHA1

    ac89b62afbd460f9aeb8a708dbf36df7f756c1ad

    SHA256

    c67629746eb7eb4203a24e4843c824ff0e7eefd3905003f2790ce90c08dfaa29

    SHA512

    1c944593a77d1af298e6fd8e9641958cb75c15c9ec697d3d72d1e9a0bf7c32529c50808a185fea9292af532d1c04dc688b32f37dea3f1a8cd16402d19b1b78be

  • /data/user/0/com.lnqm.isxy.udni/app_tjc/oat/joy.jar.cur.prof
    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • /data/user/0/com.lnqm.isxy.udni/app_tjc/tjoy.jar
    Filesize

    66KB

    MD5

    a583245803ebb7c627f6c5afe73dea3d

    SHA1

    8e0d18478a5230bf537580181abbbf80d81c65b9

    SHA256

    764b3505b93a104a1dc63b041d0256f8fccf8de928de562b112aa0807830bf80

    SHA512

    ed2dc92f657a0fb7ba68034d0504e7f0afb325b765c4dfa522918d65ffe126e058dfea1b910410c5f334e8aad17eadcf28ba4fff04067148eaf1195dd1a2ddf6

  • /storage/emulated/0/.cache/apk01
    Filesize

    1.1MB

    MD5

    a4f5b2c85754c3eb67517e53c678e769

    SHA1

    605e21e683650f5c233b01963936786cba50c7c7

    SHA256

    16ee66e23350c218b8ca5a4fd06d94090ece374ae2fd20531cd7f32c6a3ae5a5

    SHA512

    c41be591c4352377568395dd3388a98581431f1ccaf9809d9d9e466988dd84ca5f4d6e410136325c150041d389e132c18bafc28f8a81525258b4073e3d4fbf6e

  • /storage/emulated/0/.cache/youla1101.apk
    Filesize

    1.1MB

    MD5

    688efee5b9cb6a3028d08c4e3c82022d

    SHA1

    45df593b7b8db1ef24dfe69c127ab78022400955

    SHA256

    b0ebe385345c90468cba35bfced63ca886352fcc7c4c2d8df342442cca86faa5

    SHA512

    4c15e68b770e5727de730d4c39ff0e19784e6eef1414759db631be47e87979b40fa7438a5bb6727a8115dd379135257a0a80f34b1e786f52de5103d388279230