Analysis
-
max time kernel
3090879s -
max time network
81s -
platform
android_x86 -
resource
android-x86-arm-20220823-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20220823-enlocale:en-usos:android-9-x86system -
submitted
26-11-2022 18:00
Static task
static1
Behavioral task
behavioral1
Sample
d10b2abd19c468b344ff824184779304a8b9b01a28caca41c148c25901f5e46b.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
d10b2abd19c468b344ff824184779304a8b9b01a28caca41c148c25901f5e46b.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
d10b2abd19c468b344ff824184779304a8b9b01a28caca41c148c25901f5e46b.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
d10b2abd19c468b344ff824184779304a8b9b01a28caca41c148c25901f5e46b.apk
-
Size
903KB
-
MD5
59c1dea8f817439f81b2310829482c34
-
SHA1
7432af28fd065a3381252bf5db864f930496628e
-
SHA256
d10b2abd19c468b344ff824184779304a8b9b01a28caca41c148c25901f5e46b
-
SHA512
0c8eced500b52d11e3faaaa60467aa2ef691442a8b9cad03432a6dc80b091c05dbb261a90758d7178663f861254fe72222d4c967f4b3ba514c0825ab7f73c547
-
SSDEEP
24576:TJmxTAZNIPviy2ukqywdb1i1NDWO0TtAutzmgP6r:tmxTArMeukqtdb1ifiO0JXo4I
Malware Config
Signatures
-
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
cn.cq.yb20150407description ioc process Framework API call javax.crypto.Cipher.doFinal cn.cq.yb20150407
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/cn.cq.yb20150407/databases/cn.cq.yzFilesize
32KB
MD52126e5a70fb48e951bc40d707436cfae
SHA104d71d4988756e38a0ea6b0f4dad6896917038d5
SHA2566b6c580bbe167dfaf7e26e6e062ec46286a4874ed816d59bf4bf79b07f29ffef
SHA51238d24329e7ba27bd0c9597207213de716989663e405a21be61f2c4254e4db9b1dfef30017357171710f00f2d25f81cca2c5f3546a132b448faf45e51cc87da7d
-
/data/user/0/cn.cq.yb20150407/databases/cn.cq.yz-journalFilesize
524B
MD58f9a8a738494a5735da0432f23d0263c
SHA153c83503a2656d9a994f4ae59539c2f2f4588417
SHA25661ce952c8595fa3bbe2b8096e8806c0afbefe435f3dcd322facbb84d7fcfd89a
SHA51258b7c42066f9c1602b6df7559c07da1ad8ccb9a75a6f91d526b2fffeaa46852798dfd7ebe781fcb9f9c923ca214394db0050ca2e86463671c9e46eb27b78af51
-
/data/user/0/cn.cq.yb20150407/databases/cn.cq.yz-shmFilesize
8B
MD57dea362b3fac8e00956a4952a3d4f474
SHA105fe405753166f125559e7c9ac558654f107c7e9
SHA256af5570f5a1810b7af78caf4bc70a660f0df51e42baf91d4de5b2328de0e83dfc
SHA5121b7409ccf0d5a34d3a77eaabfa9fe27427655be9297127ee9522aa1bf4046d4f945983678169cb1a7348edcac47ef0d9e2c924130e5bcc5f0d94937852c42f1b
-
/data/user/0/cn.cq.yb20150407/databases/cn.cq.yz-walFilesize
40KB
MD54f83dfc0d2037802517b9bf7495ad0fd
SHA1a307c7359536618fc2b7db9c811ae61ed3e90876
SHA2561fcd97953db707ff4d883ab96d24d0bf4876ea13c260ec154fb7a96446007b50
SHA5128ee63f7a9d6aa0648403ad9a256cd20d9e83aa6ea3f7879da635b93e3755d16a3436b1a1f13bf8b44f7c7fade0467cb8531db8770b3768a1c423508cd8e91362
-
/storage/emulated/0/Download/P.apkMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
/storage/emulated/0/Download/P.apkMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e