Overview
overview
8Static
static
6710b5af1a0...41.apk
android-9-x86
8710b5af1a0...41.apk
android-10-x64
8710b5af1a0...41.apk
android-11-x64
8Duoguo.apk
android-9-x86
Duoguo.apk
android-10-x64
Duoguo.apk
android-11-x64
dvhbzbvacyfbegnot.apk
android-9-x86
dvhbzbvacyfbegnot.apk
android-10-x64
dvhbzbvacyfbegnot.apk
android-11-x64
Analysis
-
max time kernel
2308967s -
max time network
149s -
platform
android_x64 -
resource
android-x64-arm64-20231215-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20231215-enlocale:en-usos:android-11-x64system -
submitted
20-12-2023 00:04
Static task
static1
Behavioral task
behavioral1
Sample
710b5af1a0b285797b15a3f77cb4585cf7b58e576a0a99df45591c540067f441.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
710b5af1a0b285797b15a3f77cb4585cf7b58e576a0a99df45591c540067f441.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
710b5af1a0b285797b15a3f77cb4585cf7b58e576a0a99df45591c540067f441.apk
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral4
Sample
Duoguo.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral5
Sample
Duoguo.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral6
Sample
Duoguo.apk
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral7
Sample
dvhbzbvacyfbegnot.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral8
Sample
dvhbzbvacyfbegnot.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral9
Sample
dvhbzbvacyfbegnot.apk
Resource
android-x64-arm64-20231215-en
General
-
Target
710b5af1a0b285797b15a3f77cb4585cf7b58e576a0a99df45591c540067f441.apk
-
Size
1.6MB
-
MD5
8cc8c1dfb3f3d0071d40f84ccdb22b9c
-
SHA1
115b353e5423e48d007d890603c07be5e75d7912
-
SHA256
710b5af1a0b285797b15a3f77cb4585cf7b58e576a0a99df45591c540067f441
-
SHA512
9031ddbaa7cff3d3e0820bb5bd3a85141a31e1e1954e5c835b7debc75c3b56d3cadd982d72a1f7867a90a4e71688e63d115a409852c9bdb54e3cfef694ccba69
-
SSDEEP
49152:xuy6/xrTXABjhzad3gWPy3IgWoM2bQOD0/D+gai:syUdTXiAd63/5MMQOqx3
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 IoCs
description ioc Process Framework service call android.content.pm.IPackageManager.getInstalledApplications com.chongxiang.game -
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.chongxiang.game
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
490B
MD51bae0a3e8898f177652ec8cf4294dd81
SHA10468f62c96c70d1a3ceb092e3c41077f4482ecbd
SHA2566394c041d09ceec3ec3fd73ecda18984fb25b1702baed68522ac4841d71191ae
SHA51264105e7b71fa7d34678149a0b93c4a5cfc879ab17184f9c3c9da38b0b7a362b51ed87fcb0008c66490550239aa3313c0757e251ea582c5094feecea30298abb7
-
/storage/emulated/0/.dianjin/com.chongxiang.game/properties/7fe79c97dac8df4ef7f328137ffdec8.properties
Filesize81B
MD5e99ff30a80c5f70908b6c2ee3b196e0a
SHA14ed5e9f00900cf4678a2a3b4a977bb0cd55e6f0c
SHA2565678cea7b0e3d68b8ab301e04bb71bb79354b2ad2ed164c8e6f503a3dec3290a
SHA5128187b4df7ed1a522d67fae2d86fdf2323ccf343c391997d4d00de6fa74be628d8f5de1064ac9af4595527a61f167a9e3e75ec813dfa52eb57e2ef81fe2c4cc16