Analysis
-
max time kernel
496604s -
max time network
134s -
platform
android_x64 -
resource
android-x64-20230831-en -
resource tags
androidarch:x64arch:x86image:android-x64-20230831-enlocale:en-usos:android-10-x64system -
submitted
11/10/2023, 06:00
Behavioral task
behavioral1
Sample
abf7f807dafa04d517a562f1beab15bd77f584f399b48e7f371a7fef42bf9882_JC.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
abf7f807dafa04d517a562f1beab15bd77f584f399b48e7f371a7fef42bf9882_JC.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
abf7f807dafa04d517a562f1beab15bd77f584f399b48e7f371a7fef42bf9882_JC.apk
Resource
android-x64-arm64-20230831-en
General
-
Target
abf7f807dafa04d517a562f1beab15bd77f584f399b48e7f371a7fef42bf9882_JC.apk
-
Size
3.0MB
-
MD5
2f34af0337a3b85310a6026c74fb89e2
-
SHA1
09da0f8c05ff3e7314063a07bfe7616dbef39692
-
SHA256
abf7f807dafa04d517a562f1beab15bd77f584f399b48e7f371a7fef42bf9882
-
SHA512
c1dd30b110d43c11a551bcd9d0fc2ba5e9f3bcd94eded0080a201b5b7ce6c0ba43a7e73faa041a15bacd6aa347b58873cd9f5d51940d64d521ff2d5f550756e2
-
SSDEEP
49152:thCx/vtCQk3pmjS5/Xv9L7gtSMr9VVkqAjSqz5sMh+JjhwHZ6Hqy5E8lHs/Ip7f/:tE7Ymj2vFwLq/S25sMhsF2Qqy5Ll1h
Malware Config
Signatures
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.lydia.route
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90B
MD590cf2403d6beefb3c2dfaa3c53f5e1d2
SHA16ca653c75d90e7d85aa2aee7007b8b78bccad7bb
SHA256508d932c32b1598aed29427936af168d03531180a4e2cf5e865249841a29e5cd
SHA51267fa6ac8da714b368a598dcb0214386423c1c3bc982799a119b4b07db0394c6fad77e4d1b9b867da27cc9087dc72ac1d32b758bf4e4828dbfe2383217bfbe4f0