Analysis

  • max time kernel
    3205040s
  • max time network
    159s
  • platform
    android_x64
  • resource
    android-x64-arm64-20231023-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20231023-enlocale:en-usos:android-11-x64system
  • submitted
    11/11/2023, 15:32

General

  • Target

    a33.apk

  • Size

    40KB

  • MD5

    9f972dbe36d4ce709aa21c291d632d31

  • SHA1

    2bfeeeacf67b2c7668684595bd6bc28bf4483848

  • SHA256

    741684cfcbc861b076bd7561be29f8bd3f1814b9049034a0412601f786f0f0f0

  • SHA512

    3bd752adb194142a270d47267fd6b80d1018b012fc7ed55224d614d1a020755639f32df78519fd7100fa56d6f030941e6e28488c93d5d102e8c1f6ad61587829

  • SSDEEP

    768:WNC+zVgpQfomNawN4N5N3NAC4IF2CCx2fkVt4CmGM:obOzdN4Q2DxvVt4C9M

Score
8/10

Malware Config

Signatures

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps). 1 IoCs
  • Tries to add a device administrator. 1 IoCs

Processes

  • android.phone.com
    1⤵
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
    • Tries to add a device administrator.
    PID:4392
    • logcat -c
      2⤵
        PID:4464
      • logcat
        2⤵
          PID:4492

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • /data/user/0/android.phone.com/files/phone.xml

              Filesize

              178B

              MD5

              1c8625124cd521964daad4005294ab36

              SHA1

              537d1bac0616ff7707ccef80b210943abadb47a4

              SHA256

              f1c13bf49bba0acc5ac866597bd582a679cdecbe362868a8e5cab94710b19e95

              SHA512

              aa5990babd77b00c065aeb304100efb59a72b1e14ee68cfd4652aed0a7503c9f07f74683abeb6e05a95f833bec76471e2b69beb371b3fa241224e36591335047