Analysis
-
max time kernel
3191072s -
max time network
160s -
platform
android_x64 -
resource
android-x64-20220823-en -
resource tags
androidarch:x64arch:x86image:android-x64-20220823-enlocale:en-usos:android-10-x64system -
submitted
27/11/2022, 14:39
Static task
static1
Behavioral task
behavioral1
Sample
19063d52ab7d9bdf8191724381e1f57e84485e4c4a83291cb1c8c7016fb1eae5.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
19063d52ab7d9bdf8191724381e1f57e84485e4c4a83291cb1c8c7016fb1eae5.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
19063d52ab7d9bdf8191724381e1f57e84485e4c4a83291cb1c8c7016fb1eae5.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
19063d52ab7d9bdf8191724381e1f57e84485e4c4a83291cb1c8c7016fb1eae5.apk
-
Size
342KB
-
MD5
f2e32eedee2402d064c6c8047c1bc387
-
SHA1
a8f227b836320d06faa6b86aa04f4796051113ed
-
SHA256
19063d52ab7d9bdf8191724381e1f57e84485e4c4a83291cb1c8c7016fb1eae5
-
SHA512
582a78e91a59db318cee53856179d2255ad7da90f563bf33b6443c0c041d8d4dc17602ac44d84e644ac360cd44c2efbcfd81fe1ae58fee15c93b6e50fbeae8ab
-
SSDEEP
6144:zKRYdWyQw/kC+PDRDWID4Ich/BICmkM+PsSE:zKqdPQIknPD5WcMVBhM+PsF
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.alphadev.midlet.executor/app_jarSrcDir/executable.jar 4747 com.alphadev.midlet.executor -
Reads information about phone network operator.
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5def64d2e5d86308b1a5d46059f168bcd
SHA10283b2e36ad13373d1c972d539a2abd7f4854cb7
SHA256cf93f2f8548c635047bebf78efc3f6002a7f9f97fba225dd64c8d2fa5df54a82
SHA512bd4881b6d845f9de7b73c769877e348c399eca47f193e4e154107d7447ad55976e4e62d2cfedb235e4ff6efb6cd2d28fd88e4dcdfbc592494ac35d87726def51