Analysis
-
max time kernel
3153436s -
max time network
139s -
platform
android_x64 -
resource
android-x64-arm64-20220823-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20220823-enlocale:en-usos:android-11-x64system -
submitted
27-11-2022 06:47
Static task
static1
Behavioral task
behavioral1
Sample
4869cde58d6a11e5ad8b7e2af2a98363cb8d99c5afbf49943b9bb3283ac63e06.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
4869cde58d6a11e5ad8b7e2af2a98363cb8d99c5afbf49943b9bb3283ac63e06.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
4869cde58d6a11e5ad8b7e2af2a98363cb8d99c5afbf49943b9bb3283ac63e06.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
4869cde58d6a11e5ad8b7e2af2a98363cb8d99c5afbf49943b9bb3283ac63e06.apk
-
Size
903KB
-
MD5
13a26c6b13b78f66f38065920a0ecd81
-
SHA1
bc9da351e6d283dd52141099af88724a97ffa1e2
-
SHA256
4869cde58d6a11e5ad8b7e2af2a98363cb8d99c5afbf49943b9bb3283ac63e06
-
SHA512
31457bb9063aa2b5ff933ac11c772780a7652f42a5321d3829d27c5b2a62cba369d166c449ea7cf955e6ee42d1933cc4133c45d6b650ed668472e76fe7b8476f
-
SSDEEP
24576:TJmxTAZNIPviy2ukqyw7b1i1NCV3fTjUZJvqo:tmxTArMeukqt7b1ifATjUDvH
Malware Config
Signatures
-
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
cn.cq.yb20150407description ioc process Framework API call javax.crypto.Cipher.doFinal cn.cq.yb20150407
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/cn.cq.yb20150407/databases/cn.cq.yzFilesize
88KB
MD51d77e8c8e82017003c8f08d6bea5c5b9
SHA1a715f0c64b25b555cb0ddf59e2b158a7ed0ef6af
SHA256e27cf73f503c1897dfa49844984f719eb4430ea52ee980e26fcb31774144ac93
SHA512b5cd1751d5d0614d32ecc84966c415ae0b560e74ff2e81009784107454051908077ed8385e916cb8869f837da6e3105ec7d047390969d6868fdc97802e443c14
-
/data/user/0/cn.cq.yb20150407/databases/cn.cq.yz-journalFilesize
1KB
MD5377bf078e64099d056b686c782cef9aa
SHA14eec6e2d89472cac8279d50a0da8ef806b648bf9
SHA25648cba935e6bce155b3376f24b3ff9a6a8b6860e49d50bd500cdd87f1a29784a3
SHA51221ebd86802a37e8c0aecfbc6ba07bbfae27b5f083f8c54c7d242b9bf09895e8b02d298e68a872bea6069c0bfa2bdd18dcfa982184615cf505fc625e7a717448d
-
/storage/emulated/0/Download/P.apkMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
/storage/emulated/0/Download/P.apkMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e