Analysis

  • max time kernel
    3070491s
  • max time network
    167s
  • platform
    android_x64
  • resource
    android-x64-arm64-20220823-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20220823-enlocale:en-usos:android-11-x64system
  • submitted
    26-11-2022 13:35

General

  • Target

    8ca7889ff4cc0ff5019f9e45a63a6785f01fb6b9e9bd288085743ab6a9fc1cb4.apk

  • Size

    1.8MB

  • MD5

    eb0ac2b4bf64b10e1943afced293384f

  • SHA1

    e352c2900dcdc153dc17f8b1c7ed1d13208d542c

  • SHA256

    8ca7889ff4cc0ff5019f9e45a63a6785f01fb6b9e9bd288085743ab6a9fc1cb4

  • SHA512

    34bcc7b0c1b63cdfde0159fb013dc4ae3b63323cf2d747fea544030c8cdb218cd6fed3ef523d9ecbb29443994b79ee14a681cddee31bab7e514c8458d9c2b006

  • SSDEEP

    49152:nIbLsO8w12yPUCEJ0g8H2JWfsld+H/cn1Zxze3fXQTj2aX6/9oAVLRQsdJHbAlHI:fSnAbE/4112v9XuWcU

Score
6/10

Malware Config

Signatures

  • Reads information about phone network operator.
  • Uses Crypto APIs (Might try to encrypt user data). 1 IoCs

Processes

  • cc.romipij.ghojtk.tphvh
    1⤵
    • Uses Crypto APIs (Might try to encrypt user data).
    PID:4406

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads