Analysis

  • max time kernel
    2490810s
  • max time network
    130s
  • platform
    android_x86
  • resource
    android-x86-arm-20231215-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20231215-enlocale:en-usos:android-9-x86system
  • submitted
    20/12/2023, 06:00

General

  • Target

    8a1025a378bff611e810ed3425b31bbf52d235214de0f53f64d49b71f44aae8a.apk

  • Size

    1.6MB

  • MD5

    90e5f2f62e1288c6c2f50d2ebaea201b

  • SHA1

    cea0bbc9fa2c25b64b00bfcd258ea50c07ff5df7

  • SHA256

    8a1025a378bff611e810ed3425b31bbf52d235214de0f53f64d49b71f44aae8a

  • SHA512

    89db3d5cecf8dc160affa1439cdfec252daf43558d81e6a5bae14069ded5e7d21b325a7ac5dcc0e6ddd5aad061ce4d9a8a26e1132b888e392764feba19621bc3

  • SSDEEP

    49152:SPkp/bDnR8utVgHC0a3gV2xDCAzjZ7Hl8U0:SIx8rnmDCAB7Hlq

Score
4/10

Malware Config

Signatures

  • Uses Crypto APIs (Might try to encrypt user data) 1 IoCs

Processes

  • com.celticspear.matches.bysc_4
    1⤵
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4251

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /storage/emulated/0/Android/data/code/MID.DAT

    Filesize

    60B

    MD5

    c679783f144b5b77cbcc89952b9590de

    SHA1

    339c29f74856fbb0a27070d1d90c1acde4d49142

    SHA256

    03e9e03b09bb456d2e730f787e5b232d119d59547959fd73617cbf44dcf56de3

    SHA512

    5ac8cdf1e7950029ccd418c6df2991e9763083cc631f549ab2302758b0cd634817c1f712db7310927ba39aa9612e7be746532142434d314fb7231e2f97d4aa2f