Analysis
-
max time kernel
3069832s -
max time network
147s -
platform
android_x64 -
resource
android-x64-20220823-en -
resource tags
androidarch:x64arch:x86image:android-x64-20220823-enlocale:en-usos:android-10-x64system -
submitted
26-11-2022 13:33
Static task
static1
Behavioral task
behavioral1
Sample
9dc9aab20fc550c38e40d2f06320ddd2aab462d1ff4d28d3a8aa46dfd098e15a.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
9dc9aab20fc550c38e40d2f06320ddd2aab462d1ff4d28d3a8aa46dfd098e15a.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
9dc9aab20fc550c38e40d2f06320ddd2aab462d1ff4d28d3a8aa46dfd098e15a.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
9dc9aab20fc550c38e40d2f06320ddd2aab462d1ff4d28d3a8aa46dfd098e15a.apk
-
Size
766KB
-
MD5
b7845ba7311a920e594424ca99e2418d
-
SHA1
e770c3c6d09677f86c16a79c13aa283f3844de16
-
SHA256
9dc9aab20fc550c38e40d2f06320ddd2aab462d1ff4d28d3a8aa46dfd098e15a
-
SHA512
0e12ae20d03826d139264808df1c303e41574f4592ce0ef85eebdaf47df5cbc58a8891b0aa35789add595c20025697e259257d3d72c2d98dd3fb05c91ccfed53
-
SSDEEP
12288:F9sqNDCrfME886oN/ak3IQTpUKCBeIUITgms+T0XMapftMzVlTJohVjNL6OYpyzQ:F9siCrkE886gR3IQWKCvUITnzmMapfte
Malware Config
Signatures
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
cn.net.rgmhpnjr.hokhju.puvunidescription ioc process Framework API call javax.crypto.Cipher.doFinal cn.net.rgmhpnjr.hokhju.puvuni