Analysis
-
max time kernel
3165452s -
max time network
134s -
platform
android_x64 -
resource
android-x64-20220823-en -
resource tags
androidarch:x64arch:x86image:android-x64-20220823-enlocale:en-usos:android-10-x64system -
submitted
27/11/2022, 09:20
Static task
static1
Behavioral task
behavioral1
Sample
3845f4b3d1a77a661cfcd08e0e8e9532af8b76fad96585bb7700644931b13eff.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
3845f4b3d1a77a661cfcd08e0e8e9532af8b76fad96585bb7700644931b13eff.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
3845f4b3d1a77a661cfcd08e0e8e9532af8b76fad96585bb7700644931b13eff.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
3845f4b3d1a77a661cfcd08e0e8e9532af8b76fad96585bb7700644931b13eff.apk
-
Size
340KB
-
MD5
9faf67d3df57820b231a863ee8d10220
-
SHA1
c7f7fbb5df2e7aa4fe80d01a6a894c3baf2c2345
-
SHA256
3845f4b3d1a77a661cfcd08e0e8e9532af8b76fad96585bb7700644931b13eff
-
SHA512
f25c585a8ec60c5b815d067f0b77b60a4f29b13f9d0624bf55f908bcd27ab68793a665bc35c22ba041c94aa6140ba64532fbaa13f71d84c78035cf2ea740f71e
-
SSDEEP
6144:sVmKRYOyCsBdQ5nlDRDWID4IcWV2W8azfIO:sVmKqrCsB8nlD5WcMW0Af5
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.alphadev.midlet.executor/app_jarSrcDir/executable.jar 4751 com.alphadev.midlet.executor -
Reads information about phone network operator.
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5def64d2e5d86308b1a5d46059f168bcd
SHA10283b2e36ad13373d1c972d539a2abd7f4854cb7
SHA256cf93f2f8548c635047bebf78efc3f6002a7f9f97fba225dd64c8d2fa5df54a82
SHA512bd4881b6d845f9de7b73c769877e348c399eca47f193e4e154107d7447ad55976e4e62d2cfedb235e4ff6efb6cd2d28fd88e4dcdfbc592494ac35d87726def51