Analysis
-
max time kernel
3177183s -
max time network
156s -
platform
android_x86 -
resource
android-x86-arm-20220823-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20220823-enlocale:en-usos:android-9-x86system -
submitted
27-11-2022 12:51
Static task
static1
Behavioral task
behavioral1
Sample
f59e53e4c6f370a7fb1b12189cb517fee8b83e0ee5c64f25064b9889d898cb9d.apk
Resource
android-x86-arm-20220823-en
General
-
Target
f59e53e4c6f370a7fb1b12189cb517fee8b83e0ee5c64f25064b9889d898cb9d.apk
-
Size
1.2MB
-
MD5
64ad10e27b03f744c517e741dbe75d59
-
SHA1
81fc46f3c1f4633720fe83658ba4a8aa73aa478a
-
SHA256
f59e53e4c6f370a7fb1b12189cb517fee8b83e0ee5c64f25064b9889d898cb9d
-
SHA512
2940c6f3aaf95dac4a340548b5678a3bfe56da88ee2810a814b11c9902b46353931c80b3571499fc6e06561853e8767c7e9a39ad5d08e199ef8ed2e141eead43
-
SSDEEP
24576:LXPOd9NH48Y3XnjEblk4Pc/2loTKgWpYNaknSSxzjFO+klrLTiStJvngylX:bP4H4ZNCoTKvpAH9LGD1JVR
Malware Config
Signatures
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
flsuvfrfmd.crnpq.trggqdescription ioc process Framework API call javax.crypto.Cipher.doFinal flsuvfrfmd.crnpq.trggq
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/flsuvfrfmd.crnpq.trggq/shared_prefs/Game.xmlFilesize
117B
MD5af85887185a296c934ff1762a35f16dd
SHA1af52694fea6ef52ffb7d73f0db7955ad6e52e6b9
SHA256df0560fcd9e28c47ad44525b73b71340b4fc9d90cd7efec7aca9e1845f16763c
SHA512e11e710206c82404c7749fe06852bb179cafb5986aa37caf72a34cb48f68b3db81cb5338de3e89b9c7011af0ea4cd155a2c00549e45d63e4864b5c6f12995997