Analysis

  • max time kernel
    2323009s
  • max time network
    154s
  • platform
    android_x86
  • resource
    android-x86-arm-20231215-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20231215-enlocale:en-usos:android-9-x86system
  • submitted
    20/12/2023, 01:47

General

  • Target

    7afa37ce6df796958a06598578dbdd25a34da0c339a68611d39b5d932d30966e.apk

  • Size

    134KB

  • MD5

    e4187a74e6bef1a8cd30116500ed10f8

  • SHA1

    1debb019cce390969add09b4587ad0fd4045ff59

  • SHA256

    7afa37ce6df796958a06598578dbdd25a34da0c339a68611d39b5d932d30966e

  • SHA512

    0af46b103c33394e44f82335674272ef31a054d4760d281c6f8220c02ba69d96fea922f07e300b27b95c7a8a7d38a236a18342f35ce64670f2ed36a8985759b1

  • SSDEEP

    3072:4STIbXI59TakwclcYOWRlbpSfwyRPk7YxcabNvj0C1V0XY7:4STEO9TplcYOWRswyy8c0Nvjhws

Score
8/10

Malware Config

Signatures

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 3 IoCs
  • Removes its main activity from the application launcher 1 IoCs
  • Requests enabling of the accessibility settings. 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 2 IoCs

Processes

  • jimfgb.uhdf
    1⤵
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
    • Removes its main activity from the application launcher
    PID:4263
  • jimfgb.uhdf:cproc
    1⤵
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
    • Requests enabling of the accessibility settings.
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4292
  • jimfgb.uhdf:cproc
    1⤵
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4375

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads