Analysis
-
max time kernel
2490810s -
max time network
130s -
platform
android_x86 -
resource
android-x86-arm-20231215-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20231215-enlocale:en-usos:android-9-x86system -
submitted
20/12/2023, 06:00
Static task
static1
Behavioral task
behavioral1
Sample
8a1025a378bff611e810ed3425b31bbf52d235214de0f53f64d49b71f44aae8a.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
8a1025a378bff611e810ed3425b31bbf52d235214de0f53f64d49b71f44aae8a.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
8a1025a378bff611e810ed3425b31bbf52d235214de0f53f64d49b71f44aae8a.apk
Resource
android-x64-arm64-20231215-en
General
-
Target
8a1025a378bff611e810ed3425b31bbf52d235214de0f53f64d49b71f44aae8a.apk
-
Size
1.6MB
-
MD5
90e5f2f62e1288c6c2f50d2ebaea201b
-
SHA1
cea0bbc9fa2c25b64b00bfcd258ea50c07ff5df7
-
SHA256
8a1025a378bff611e810ed3425b31bbf52d235214de0f53f64d49b71f44aae8a
-
SHA512
89db3d5cecf8dc160affa1439cdfec252daf43558d81e6a5bae14069ded5e7d21b325a7ac5dcc0e6ddd5aad061ce4d9a8a26e1132b888e392764feba19621bc3
-
SSDEEP
49152:SPkp/bDnR8utVgHC0a3gV2xDCAzjZ7Hl8U0:SIx8rnmDCAB7Hlq
Malware Config
Signatures
-
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.celticspear.matches.bysc_4
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5c679783f144b5b77cbcc89952b9590de
SHA1339c29f74856fbb0a27070d1d90c1acde4d49142
SHA25603e9e03b09bb456d2e730f787e5b232d119d59547959fd73617cbf44dcf56de3
SHA5125ac8cdf1e7950029ccd418c6df2991e9763083cc631f549ab2302758b0cd634817c1f712db7310927ba39aa9612e7be746532142434d314fb7231e2f97d4aa2f