Analysis
-
max time kernel
3501856s -
max time network
159s -
platform
android_x86 -
resource
android-x86-arm-20230621-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20230621-enlocale:en-usos:android-9-x86system -
submitted
07/08/2023, 15:57
Behavioral task
behavioral1
Sample
d8469412b6ca3bc82e472962ad9adf1640ffeb20f5819ec9f738ef29863d7060.apk
Resource
android-x64-20230621-en
Behavioral task
behavioral2
Sample
d8469412b6ca3bc82e472962ad9adf1640ffeb20f5819ec9f738ef29863d7060.apk
Resource
android-x64-arm64-20230621-en
Behavioral task
behavioral3
Sample
d8469412b6ca3bc82e472962ad9adf1640ffeb20f5819ec9f738ef29863d7060.apk
Resource
android-x86-arm-20230621-en
General
-
Target
d8469412b6ca3bc82e472962ad9adf1640ffeb20f5819ec9f738ef29863d7060.apk
-
Size
786KB
-
MD5
ff3a1df8d2bc1cf01b5630a52390d98a
-
SHA1
ee7b0785a72e4f8c8f1892f93b9db3a6aa77ae57
-
SHA256
d8469412b6ca3bc82e472962ad9adf1640ffeb20f5819ec9f738ef29863d7060
-
SHA512
4843530e84fb5ea004a039be3f19f97a0107afea35dfe8070dec09152aecfda527a1a3fd37ba9adaf131809c28c9ace1ca763496f3351e4715a55ea98eb7c306
-
SSDEEP
24576:jpUH+OR9T8MiIHi0/fS95NA8HfcdWO8wZd:jpUH9aJIVS95NJHfWzd
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps). 1 IoCs
description ioc Process Framework service call android.content.pm.IPackageManager.getInstalledApplications po.icrc2yemen