Analysis
-
max time kernel
729905s -
max time network
150s -
platform
android_x64 -
resource
android-x64-arm64-20220823-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20220823-enlocale:en-usos:android-11-x64system -
submitted
29-03-2023 03:51
Behavioral task
behavioral1
Sample
1f1cdd9acd9e581f538bdefc1ec5f0aebcc57cfccf5a4a9389f35c8741242e32.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral2
Sample
1f1cdd9acd9e581f538bdefc1ec5f0aebcc57cfccf5a4a9389f35c8741242e32.apk
Resource
android-x64-arm64-20220823-en
Behavioral task
behavioral3
Sample
1f1cdd9acd9e581f538bdefc1ec5f0aebcc57cfccf5a4a9389f35c8741242e32.apk
Resource
android-x86-arm-20220823-en
General
-
Target
1f1cdd9acd9e581f538bdefc1ec5f0aebcc57cfccf5a4a9389f35c8741242e32.apk
-
Size
792KB
-
MD5
02354fa33b3a3a9fbf63b79ae9cdc81a
-
SHA1
9d5c5e9a5a7d7283e81791b0f4c9adaae03eb09f
-
SHA256
1f1cdd9acd9e581f538bdefc1ec5f0aebcc57cfccf5a4a9389f35c8741242e32
-
SHA512
2411bdbc9a55373a57112a5bae05ef0fd9d037383e9887318b8b8c24bc100160838f190033572e08f3992d2e78c6d8dcdf873e7a72619fb0c2c38a9fb153c8ba
-
SSDEEP
6144:kiuDHcw2ty36cSDbp1UqNwEWeLmKymuXtoJd7ah43kS+rCEJ5HrbidQ/UArwo901:kPbN2tDRFDuktZ/ks4Uo902b/06Q
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps). 1 IoCs
Processes:
gv.sundaydescription ioc process Framework service call android.content.pm.IPackageManager.getInstalledApplications gv.sunday