Analysis

  • max time kernel
    3919787s
  • max time network
    136s
  • platform
    android_x86
  • resource
    android-x86-arm-20231023-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20231023-enlocale:en-usos:android-9-x86system
  • submitted
    19/11/2023, 22:10

General

  • Target

    7cab5be54ea256801ffbb8c5f14bbe8acf8c8edf4b14bec82a8e73f2a22fc229.apk

  • Size

    1.7MB

  • MD5

    e27a6a678d2a3391d3dedd7f6b5bcffe

  • SHA1

    8a0a4a6524c4fae519ca273f427a067a80fd6b5a

  • SHA256

    7cab5be54ea256801ffbb8c5f14bbe8acf8c8edf4b14bec82a8e73f2a22fc229

  • SHA512

    5e6c92fb00399d132ebfa737c50ababe748b1eca8194bfb11f07efc722d3b33ab9403a14fab79f84203f0fb2804d5652cb51bf84be286cb49cad5f396e07f077

  • SSDEEP

    49152:1sFkkzEXp3a+VmS7LFKF8/LMrDCWeyShqwr6cQVY2t9JlW:ckkoXtNYS7gaQCKShqs6JS2jK

Score
6/10

Malware Config

Signatures

  • Reads information about phone network operator.

Processes

  • com.lyufo.play
    1⤵
      PID:4284

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • /data/data/com.lyufo.play/files/PersistedInstallation8149164347090723403tmp

      Filesize

      569B

      MD5

      354f0c55effee27b6d556e4bce435172

      SHA1

      de629e3411bcfffccdfdb21f5e98374c1fd14c03

      SHA256

      38d382f3d63168920ca552facd33181eaf3448a7eb7a45e44041383f292e7cea

      SHA512

      74cfa13bb8c1b250202b52ba7e3023f9cf7ad849233c467ad9b82ff027b5f79f333d4089a30a7c036bdf3657dcbf7b774f9e59f93bbf6f967e4642777df42e8b

    • /data/data/com.lyufo.play/files/PersistedInstallation8212753947831157272tmp

      Filesize

      90B

      MD5

      d9069aab56e9ec250299b62ad501444d

      SHA1

      3936f9a94b0af2bdde1e33673377e093bd17cd45

      SHA256

      a23288ac1cba22c95edca072310a7f48831ef619c0a25f8264af5f17138121de

      SHA512

      a48b122fbb6c4babb385a055bb74579195a02f761b6c0dffd2c68d24c08c6b574ff0791efdbbdba787dff2c82ff5521c631ea9d5c67d65ee418efd7ade6f8dfa