Analysis
-
max time kernel
4157503s -
max time network
1174s -
platform
android_x64 -
resource
android-x64-20230831-en -
resource tags
androidarch:x64arch:x86image:android-x64-20230831-enlocale:en-usos:android-10-x64system -
submitted
03-10-2023 23:09
Behavioral task
behavioral1
Sample
client.apk
Resource
android-x64-20230831-en
android-10-x64
1 signatures
1200 seconds
Behavioral task
behavioral2
Sample
client.apk
Resource
android-x86-arm-20230831-en
android-9-x86
3 signatures
1200 seconds
General
-
Target
client.apk
-
Size
8.8MB
-
MD5
e2271e7335dd507f2b384b09b2e8cf25
-
SHA1
8e2b1236805110a30eda287f498b49eedd093ae2
-
SHA256
3ce284b7b24dd75955dc856299aa7f8edb5a10c029328ec76801aab7f9a0ac0e
-
SHA512
ea6b0cb5e24eb5386172d229f2a2a06a00f0d1c99a54a409cdde1f797b04cd126190a9d80e521d7f1ad870ed3675a1c50e6f3d4afdd8b633ff4c837e9d4935f6
-
SSDEEP
196608:tOBQtef2k1UbzX2o+j2iL0LTj+fn2gLHs1Mb:tOeeL1Cje2iJ1bpb
Score
8/10
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps). 1 IoCs
Processes:
cmf0.c3b5bm90zq.patchdescription ioc process Framework service call android.content.pm.IPackageManager.getInstalledApplications cmf0.c3b5bm90zq.patch