Analysis
-
max time kernel
2251843s -
max time network
130s -
platform
android_x86 -
resource
android-x86-arm-20231215-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20231215-enlocale:en-usos:android-9-x86system -
submitted
19/12/2023, 23:33
Static task
static1
Behavioral task
behavioral1
Sample
6cfddf1ccb66393de211002e713f39d641dd134c8dbbc3a9785a6990381665b4.apk
Resource
android-x86-arm-20231215-en
General
-
Target
6cfddf1ccb66393de211002e713f39d641dd134c8dbbc3a9785a6990381665b4.apk
-
Size
7.9MB
-
MD5
09a9cf4764eba4c68a0083ab96b028fb
-
SHA1
a8b3f4f1dac0f8090987904f86ae0dd29d201de2
-
SHA256
6cfddf1ccb66393de211002e713f39d641dd134c8dbbc3a9785a6990381665b4
-
SHA512
b0ab620f98127358dcf4377e797ffa69e070f3af3108257616ca7addfa18db4a55641bd2033853b10dfaac3f0a7036ebc809cfc4b10306486c3c8d79690973cd
-
SSDEEP
196608:9v7Mx7mIFfQkX0ilFoTqa6iD7cSEHhGQnyhi+bgOou9:9vGqYjX/CTtR2wQnMD5oI
Malware Config
Signatures
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.stwzl.shentoule/files/com.stl.Lei.jar 4302 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.stwzl.shentoule/files/com.stl.Lei.jar --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.stwzl.shentoule/files/oat/x86/com.stl.Lei.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.stwzl.shentoule/files/com.stl.Lei.jar 4262 com.stwzl.shentoule -
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.stwzl.shentoule
Processes
-
com.stwzl.shentoule1⤵
- Loads dropped Dex/Jar
- Uses Crypto APIs (Might try to encrypt user data)
PID:4262 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.stwzl.shentoule/files/com.stl.Lei.jar --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.stwzl.shentoule/files/oat/x86/com.stl.Lei.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4302
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214KB
MD5d6201c772127cacffdff0ce48f493f23
SHA1c053024a118d72c220978745a104acd7ace72c16
SHA25698c9ed580663a0a77bca2b7e58265c3d16795c722a4f6e4f651fe6e0e19e02bf
SHA51277606f941e8f62af78679b86377b88371bdd97110f9ae4d17c29e892f99f04651e535985221a745643b94118ff8abca0809959fc1df0755a02b8295d2413e167
-
Filesize
417KB
MD537516b259b2d609909ab9cfb56013f52
SHA1761ff9a5ea00221c33bfa9275a63fb53a2ad4923
SHA256de518914ea87ab0c8536c41dc7d281957f7585de9b30cc65f20f8e0479023551
SHA512b58a89c2fa2256fd8783c25ab2caae2e305923f7983aeba862b631a908d722254e44391b13ad1cd97e67a9c68a8e3a1b0c64d6427f03e9d032178e7552f2187a
-
Filesize
417KB
MD526f7dcc6e79fcb5c508577ec9b797f53
SHA1ceeace748b1fab8df0812802de98c16706b5a02a
SHA256ba5b98d1241e046a362c15bde148b4e9250caac1419faf6bd6d0a839671c0311
SHA5128409608412e3e3fbcb51641bf671d98eb8f6a392a23b6aebb2b2d30d508092afc55fbe40b1c89a067226db5346b57107b9ce3a11499b4fa1c9b134cfda36cf76