Resubmissions

13/07/2023, 17:50

230713-wek38saf4w 10

13/07/2023, 17:46

230713-wb9x7ahg38 10

13/07/2023, 17:44

230713-wa65xahg35 10

Analysis

  • max time kernel
    1348631s
  • max time network
    145s
  • platform
    android_x64
  • resource
    android-x64-arm64-20230621-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20230621-enlocale:en-usos:android-11-x64system
  • submitted
    13/07/2023, 17:50

General

  • Target

    YouPhone.apk

  • Size

    754KB

  • MD5

    d007f643041255d608d01bb25ddf1b5a

  • SHA1

    4fba327380542c65b365d598d1cd237e3f6a35bc

  • SHA256

    4688fcfac3e3b8f685033fb8e0e9ff29a8a8862a8515a9fa258c84bb67259a8e

  • SHA512

    ddff83fbbf807b144da0dffea3e9396e239d2bd708e0116a9545a75ffe985b3b2573f6ed28d1821b759ba8ed1bea21ca60891fa8f1ac738bd81bcee62c017574

  • SSDEEP

    12288:8OIwha1a8LdeWzCECtc2L5WmpYshXZPbGwidNpg8lr:tha1a6evvtc2L5WmD9idNpDr

Score
8/10

Malware Config

Signatures

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps). 1 IoCs

Processes

  • cmf0.c3b5bm90zq.patch
    1⤵
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
    PID:4368
    • su
      2⤵
        PID:4404
      • su
        2⤵
          PID:4529

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • /storage/emulated/0/CMDPINIG/config13-07-2023.log

              Filesize

              39B

              MD5

              d2bf50985cd07f9175204138a1b32c67

              SHA1

              7bb5b15c8ad5fd4cb9119598e5755352cd098ccc

              SHA256

              1d7ddf8b688673a8f7848c47eb98647a52a442d68faea26e504ad4dd607592c0

              SHA512

              40a7517d178de62c46797303550b77593bd6e6f745cbee79b59a11a14c4c5479b7109b97eb478a89b383a31c040485357c4b683c04fea355c8ce958a0c6324d8