Analysis
-
max time kernel
3183923s -
max time network
131s -
platform
android_x86 -
resource
android-x86-arm-20220823-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20220823-enlocale:en-usos:android-9-x86system -
submitted
27-11-2022 14:19
Static task
static1
Behavioral task
behavioral1
Sample
7ccdaba75a304c06af0781982cc2c18b24ae0bc9465c841adbb76dcaece0a5dd.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
7ccdaba75a304c06af0781982cc2c18b24ae0bc9465c841adbb76dcaece0a5dd.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
7ccdaba75a304c06af0781982cc2c18b24ae0bc9465c841adbb76dcaece0a5dd.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
7ccdaba75a304c06af0781982cc2c18b24ae0bc9465c841adbb76dcaece0a5dd.apk
-
Size
343KB
-
MD5
4004efcbdd005e18d116aa9005daa8f5
-
SHA1
5e619549991b77bec68d07c8835ce91b865f3646
-
SHA256
7ccdaba75a304c06af0781982cc2c18b24ae0bc9465c841adbb76dcaece0a5dd
-
SHA512
5aa6897ac03ba64eb0e60f6727e37b65bf43ee3d095d86dd970f0ca71a8cf19aa1aab0ffd2e50f8d02cc5f1d2a18bca7ad3885c50bcccdcf1146fe6efaf36855
-
SSDEEP
6144:LKRYOyCsBdQ5OGDRDWID4IcvFK5wf0TxhJtG9tb:LKqrCsB8OGD5WcMdSwz3
Malware Config
Signatures
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.alphadev.midlet.executor/app_jarSrcDir/executable.jar 4157 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.alphadev.midlet.executor/app_jarSrcDir/executable.jar --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.alphadev.midlet.executor/app_jarSrcDir/oat/x86/executable.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.alphadev.midlet.executor/app_jarSrcDir/executable.jar 4069 com.alphadev.midlet.executor -
Reads information about phone network operator.
Processes
-
com.alphadev.midlet.executor1⤵
- Loads dropped Dex/Jar
PID:4069 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.alphadev.midlet.executor/app_jarSrcDir/executable.jar --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.alphadev.midlet.executor/app_jarSrcDir/oat/x86/executable.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4157
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD53649512ab6266a93c560562fb5c1c26a
SHA1d14a949a137a300c1152e62f9b287e52fdcf1e69
SHA25695917124619045e53d232b708eaa8039049c6df76e3b832b9de4dec7ce0ce2e0
SHA51268500a2983113ef4a821cc3683a7db1d84e1f685f2a60aa7d87c15ba29dd7b45e59f859a0065602c35f8dbcec954503b0d010f6bf3703bf83785c0ea0061a26b
-
Filesize
66KB
MD5def64d2e5d86308b1a5d46059f168bcd
SHA10283b2e36ad13373d1c972d539a2abd7f4854cb7
SHA256cf93f2f8548c635047bebf78efc3f6002a7f9f97fba225dd64c8d2fa5df54a82
SHA512bd4881b6d845f9de7b73c769877e348c399eca47f193e4e154107d7447ad55976e4e62d2cfedb235e4ff6efb6cd2d28fd88e4dcdfbc592494ac35d87726def51