Analysis

  • max time kernel
    192162s
  • max time network
    117s
  • platform
    android_x64
  • resource
    android-x64-arm64-20220823-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20220823-enlocale:en-usos:android-11-x64system
  • submitted
    01/02/2023, 05:28

General

  • Target

    client.apk

  • Size

    760KB

  • MD5

    1ad7db7b8c35edb7deef63c10ab8f7ed

  • SHA1

    b30a3bcdf512131dd3dce80360814a5845ab36ad

  • SHA256

    41363e3c322a61297cb5b66eb9fbfbc34ccdb00a1230ed646934668abd112e0c

  • SHA512

    f803872c2ab2948095fa60a6791f7e1b11a491832171269fb0da944ecb3917fecedde829f394931a3ccae2d09f764de6c72ff86695948bf99148b49b7d82f7d4

  • SSDEEP

    12288:CKNl2yBa1a8LzeNldETGbIe5WmpYshXZPbGwidNpg3:CKrfa1ameNETqIe5WmD9idNpY

Score
8/10

Malware Config

Signatures

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps). 1 IoCs
  • Requests enabling of the accessibility settings. 1 IoCs
  • Tries to add a device administrator. 1 IoCs

Processes

  • cmf0.c3b5bm90zq.patch
    1⤵
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
    • Requests enabling of the accessibility settings.
    • Tries to add a device administrator.
    PID:4534

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /storage/emulated/0/dfgad/config01-02-2023.log

    Filesize

    1KB

    MD5

    a2a644367bcc77360a7eb1e95fe44a58

    SHA1

    58a5d6db6df3c4c7a21bf9099a58c585da90684e

    SHA256

    1049ad0d1c75c1e062e80bb0e3614b355dab696c2398e7d126b58b8d01fabfea

    SHA512

    65bf58d32be70a551ef716ad742da13bdf7b04b42b75d6d58e45efcd303574b78dc6fe346c5fa42cbdaadc60af048cbead053d65b1bd3acd0de8eee1f238a25b