Analysis

  • max time kernel
    176205s
  • max time network
    157s
  • platform
    android_x86
  • resource
    android-x86-arm-20230831-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20230831-enlocale:en-usos:android-9-x86system
  • submitted
    07/10/2023, 14:17

General

  • Target

    NEAS.sahamedalatapk_JC.apk

  • Size

    3.0MB

  • MD5

    c5d68490bbda4773ea03caff9f264428

  • SHA1

    ca97d89de7334b9c4b1bb7c6329ae40619edaea0

  • SHA256

    b1820179fc4818e3939b63113ad5ab22efde2ebae63c1002fc7d90debb59061a

  • SHA512

    1fcfdf10ccfb6a4a3e762e88bd9d9459ad2ce2ba90740cca7cb087943a3643183406190ca57611311b137a46b9b66e7a263c6542ff751a2fe04a0b09f0901425

  • SSDEEP

    49152:NPagnrYa6oETBHR8HpolpZRh6zLI/ZwvRZswTxFavs9h3vWyPgLYMJvAkldZHs/p:NPn1zETBRcilzR7gmQqvs9hwJvAk7p1K

Score
6/10

Malware Config

Signatures

  • Reads information about phone network operator.
  • Uses Crypto APIs (Might try to encrypt user data). 1 IoCs

Processes

  • com.lydia.route
    1⤵
    • Uses Crypto APIs (Might try to encrypt user data).
    PID:4170

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.lydia.route/files/PersistedInstallation1769271803681749045tmp

    Filesize

    567B

    MD5

    da8b8a880174fcf6ab9089332a6624d8

    SHA1

    06e7d2393a8fa0c80d23e9b0cb5eadc85819e371

    SHA256

    0215f5c23597260a49c2dcd25b5b3025f8f62f90ee563abe85c94c4616e8ef91

    SHA512

    7f6edb93aa1dceb08842b96665eb866ad6e47e7b61b63357214ea7148e02bc339ef782b814b7929ec0f406b58ec824bda2d37e71ea55414daae55fe7e0a5f620

  • /data/data/com.lydia.route/files/PersistedInstallation4118561186727613563tmp

    Filesize

    90B

    MD5

    6255cc3ef8ffaeb84db5961f3e5ed6e5

    SHA1

    519d0d0c1fb6f48651b5f42c5092c35f5ee03606

    SHA256

    b6b8b3b5ed7928d50fea5db6c1d229e5a13cc2e4b0b9116482e298c96a537fb2

    SHA512

    7b3a789308e540648381cf943ff4599a2a9271157649ea312e9f001ddd5e0b86d1c3b79630adbc3894b59d8fe9f86c85a2b2c97164a937dd183ecb8094d6efce