Analysis
-
max time kernel
3161868s -
max time network
145s -
platform
android_x86 -
resource
android-x86-arm-20220823-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20220823-enlocale:en-usos:android-9-x86system -
submitted
27/11/2022, 09:20
Static task
static1
Behavioral task
behavioral1
Sample
3845f4b3d1a77a661cfcd08e0e8e9532af8b76fad96585bb7700644931b13eff.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
3845f4b3d1a77a661cfcd08e0e8e9532af8b76fad96585bb7700644931b13eff.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
3845f4b3d1a77a661cfcd08e0e8e9532af8b76fad96585bb7700644931b13eff.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
3845f4b3d1a77a661cfcd08e0e8e9532af8b76fad96585bb7700644931b13eff.apk
-
Size
340KB
-
MD5
9faf67d3df57820b231a863ee8d10220
-
SHA1
c7f7fbb5df2e7aa4fe80d01a6a894c3baf2c2345
-
SHA256
3845f4b3d1a77a661cfcd08e0e8e9532af8b76fad96585bb7700644931b13eff
-
SHA512
f25c585a8ec60c5b815d067f0b77b60a4f29b13f9d0624bf55f908bcd27ab68793a665bc35c22ba041c94aa6140ba64532fbaa13f71d84c78035cf2ea740f71e
-
SSDEEP
6144:sVmKRYOyCsBdQ5nlDRDWID4IcWV2W8azfIO:sVmKqrCsB8nlD5WcMW0Af5
Malware Config
Signatures
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.alphadev.midlet.executor/app_jarSrcDir/executable.jar 4194 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.alphadev.midlet.executor/app_jarSrcDir/executable.jar --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.alphadev.midlet.executor/app_jarSrcDir/oat/x86/executable.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.alphadev.midlet.executor/app_jarSrcDir/executable.jar 4075 com.alphadev.midlet.executor -
Reads information about phone network operator.
Processes
-
com.alphadev.midlet.executor1⤵
- Loads dropped Dex/Jar
PID:4075 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.alphadev.midlet.executor/app_jarSrcDir/executable.jar --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.alphadev.midlet.executor/app_jarSrcDir/oat/x86/executable.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4194
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD53649512ab6266a93c560562fb5c1c26a
SHA1d14a949a137a300c1152e62f9b287e52fdcf1e69
SHA25695917124619045e53d232b708eaa8039049c6df76e3b832b9de4dec7ce0ce2e0
SHA51268500a2983113ef4a821cc3683a7db1d84e1f685f2a60aa7d87c15ba29dd7b45e59f859a0065602c35f8dbcec954503b0d010f6bf3703bf83785c0ea0061a26b
-
Filesize
66KB
MD5def64d2e5d86308b1a5d46059f168bcd
SHA10283b2e36ad13373d1c972d539a2abd7f4854cb7
SHA256cf93f2f8548c635047bebf78efc3f6002a7f9f97fba225dd64c8d2fa5df54a82
SHA512bd4881b6d845f9de7b73c769877e348c399eca47f193e4e154107d7447ad55976e4e62d2cfedb235e4ff6efb6cd2d28fd88e4dcdfbc592494ac35d87726def51