Analysis

  • max time kernel
    3069832s
  • max time network
    147s
  • platform
    android_x64
  • resource
    android-x64-20220823-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20220823-enlocale:en-usos:android-10-x64system
  • submitted
    26-11-2022 13:33

General

  • Target

    9dc9aab20fc550c38e40d2f06320ddd2aab462d1ff4d28d3a8aa46dfd098e15a.apk

  • Size

    766KB

  • MD5

    b7845ba7311a920e594424ca99e2418d

  • SHA1

    e770c3c6d09677f86c16a79c13aa283f3844de16

  • SHA256

    9dc9aab20fc550c38e40d2f06320ddd2aab462d1ff4d28d3a8aa46dfd098e15a

  • SHA512

    0e12ae20d03826d139264808df1c303e41574f4592ce0ef85eebdaf47df5cbc58a8891b0aa35789add595c20025697e259257d3d72c2d98dd3fb05c91ccfed53

  • SSDEEP

    12288:F9sqNDCrfME886oN/ak3IQTpUKCBeIUITgms+T0XMapftMzVlTJohVjNL6OYpyzQ:F9siCrkE886gR3IQWKCvUITnzmMapfte

Score
6/10

Malware Config

Signatures

  • Reads information about phone network operator.
  • Uses Crypto APIs (Might try to encrypt user data). 1 IoCs

Processes

  • cn.net.rgmhpnjr.hokhju.puvuni
    1⤵
    • Uses Crypto APIs (Might try to encrypt user data).
    PID:4744

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads