Analysis
-
max time kernel
3019270s -
max time network
17s -
platform
android_x64 -
resource
android-x64-arm64-20220823-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20220823-enlocale:en-usos:android-11-x64system -
submitted
26-11-2022 00:58
Static task
static1
Behavioral task
behavioral1
Sample
e361717e7f7cb7e6eeffb804f76b6de8a6c03ffd33258799e068676d92fd8a43.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
e361717e7f7cb7e6eeffb804f76b6de8a6c03ffd33258799e068676d92fd8a43.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
e361717e7f7cb7e6eeffb804f76b6de8a6c03ffd33258799e068676d92fd8a43.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
e361717e7f7cb7e6eeffb804f76b6de8a6c03ffd33258799e068676d92fd8a43.apk
-
Size
1.4MB
-
MD5
1f61a2513c4acd2331b1c2148d100988
-
SHA1
968b9c319f5784222e2f007d9dad2ecb060675f0
-
SHA256
e361717e7f7cb7e6eeffb804f76b6de8a6c03ffd33258799e068676d92fd8a43
-
SHA512
780731d2bf2ba8bd3b908c20c37528a222990dde460d37e62de5402cd7e5379c7d165d878aea5c3dae770ed5426ce5ea6b55aed45ea0e328b6d9bd1dc61e4a3b
-
SSDEEP
24576:Y+Ss12hsuIjIJEqKqUQGn0PgBpxHwrTs3nzJaUV4DK+nOl2lBa4xJKH/FgR4CXcP:sdhhvG0Pgd+OtPwlBa4xJUQI
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.lnqm.isxy.udniioc pid process /data/user/0/com.lnqm.isxy.udni/app_tjc/joy.jar 4563 com.lnqm.isxy.udni -
Requests dangerous framework permissions 9 IoCs
Processes:
description ioc Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE Allows an application to read SMS messages. android.permission.READ_SMS Allows an application to send SMS messages. android.permission.SEND_SMS Allows an application to receive SMS messages. android.permission.RECEIVE_SMS Allows an application to monitor incoming MMS messages. android.permission.RECEIVE_MMS Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE Allows an application to see the number being dialed during an outgoing call with the option to redirect the call to a different number or abort the call altogether. android.permission.PROCESS_OUTGOING_CALLS Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
com.lnqm.isxy.udnidescription ioc process Framework API call javax.crypto.Cipher.doFinal com.lnqm.isxy.udni
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD575ba605bcfe18a0b5f3f6f883f25d423
SHA1387cbab78be74a9a98d66f622f5d17d808af7163
SHA2560ade33f2144d84999286e47a59693634482f23ad028c1ed408963a843f9bca44
SHA512b3d43728f4c91f3422ff9b120e2669d4b9ab13bb85c538b5d0ae342073577ec671255221165592efd674dc8e6cc10fde0dd7b1fe680e41c37a5d35572ad5bf5e
-
Filesize
135KB
MD5b6dfe0e23cf40553349b3df37d5be11a
SHA1ac89b62afbd460f9aeb8a708dbf36df7f756c1ad
SHA256c67629746eb7eb4203a24e4843c824ff0e7eefd3905003f2790ce90c08dfaa29
SHA5121c944593a77d1af298e6fd8e9641958cb75c15c9ec697d3d72d1e9a0bf7c32529c50808a185fea9292af532d1c04dc688b32f37dea3f1a8cd16402d19b1b78be
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
66KB
MD5a583245803ebb7c627f6c5afe73dea3d
SHA18e0d18478a5230bf537580181abbbf80d81c65b9
SHA256764b3505b93a104a1dc63b041d0256f8fccf8de928de562b112aa0807830bf80
SHA512ed2dc92f657a0fb7ba68034d0504e7f0afb325b765c4dfa522918d65ffe126e058dfea1b910410c5f334e8aad17eadcf28ba4fff04067148eaf1195dd1a2ddf6
-
Filesize
303B
MD5d8de6910c0a6ae11c4a4a4bc31bd5314
SHA180a239b266d52073873f4f2b450f0e3b20ff6622
SHA2569894f6ac814212a02218e4448db53c3d4fc0a8f0a8936e2bf6e5464638fb47a9
SHA512a210bf5c796e9b5addfbb363ba3a636e7b29f3fd5d640a3c852ad0aa5528fc1b5da68eb3732a14191a1b9149940df0872781fd157bb22d42f50a8ec9541c5267
-
Filesize
1.1MB
MD5a4f5b2c85754c3eb67517e53c678e769
SHA1605e21e683650f5c233b01963936786cba50c7c7
SHA25616ee66e23350c218b8ca5a4fd06d94090ece374ae2fd20531cd7f32c6a3ae5a5
SHA512c41be591c4352377568395dd3388a98581431f1ccaf9809d9d9e466988dd84ca5f4d6e410136325c150041d389e132c18bafc28f8a81525258b4073e3d4fbf6e
-
Filesize
1.1MB
MD5688efee5b9cb6a3028d08c4e3c82022d
SHA145df593b7b8db1ef24dfe69c127ab78022400955
SHA256b0ebe385345c90468cba35bfced63ca886352fcc7c4c2d8df342442cca86faa5
SHA5124c15e68b770e5727de730d4c39ff0e19784e6eef1414759db631be47e87979b40fa7438a5bb6727a8115dd379135257a0a80f34b1e786f52de5103d388279230