Analysis
-
max time kernel
730827s -
max time network
135s -
platform
android_x86 -
resource
android-x86-arm-20220823-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20220823-enlocale:en-usos:android-9-x86system -
submitted
29/03/2023, 04:07
Behavioral task
behavioral1
Sample
2b7d2490bfc4eacd3e5870ae0de92fdb5c1f11a5e8fdc7c07773780c6db038d9.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral2
Sample
2b7d2490bfc4eacd3e5870ae0de92fdb5c1f11a5e8fdc7c07773780c6db038d9.apk
Resource
android-x86-arm-20220823-en
General
-
Target
2b7d2490bfc4eacd3e5870ae0de92fdb5c1f11a5e8fdc7c07773780c6db038d9.apk
-
Size
820KB
-
MD5
424cc39536810350a3cd31a0768525bd
-
SHA1
4edc676bd60cfb0fbd45aba52c7f4f2568aef4a4
-
SHA256
2b7d2490bfc4eacd3e5870ae0de92fdb5c1f11a5e8fdc7c07773780c6db038d9
-
SHA512
ae50a0f0ff2e5fb24efaabfa56b16717335c127f40c5ea6ed71cc61f625e198db62cf9cfb66420d26f4dc872f63b0622e4e5ad0ef27afbe5077f36144fcca79e
-
SSDEEP
12288:eMBpUH3phOxsk5m2jk0bffQVxBL/NYKnRJ1TeFcr:eIpUHXOxsp2JbffCBYM1hr
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps). 1 IoCs
description ioc Process Framework service call android.content.pm.IPackageManager.getInstalledApplications sam.bookhome
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59f9af9b4e2b0693ff0c20b58ab953945
SHA181e5481fdbebcd3984aecf3a726803abb1539900
SHA2562b01803fbf8b4933876462d53800379f199752b18678dab8d3be998c789384fd
SHA512e66627594f3a884f91c2522b3c49f1479d2f832c115cdb8667e0881de0445b24cf53c7d70c1b64c12d4c06ea34e291ab4bc118e46406b17aff0bfaa08cbdfff7