Analysis

  • max time kernel
    2844215s
  • max time network
    144s
  • platform
    android_x64
  • resource
    android-x64-arm64-20231215-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20231215-enlocale:en-usos:android-11-x64system
  • submitted
    22/12/2023, 16:24

General

  • Target

    eddcfe108562cc95e65e13ecf3d1ba74.apk

  • Size

    888KB

  • MD5

    eddcfe108562cc95e65e13ecf3d1ba74

  • SHA1

    34495d3733dbc56637fe8411dac72d40b88ee8b6

  • SHA256

    4514033f861dd528680a4c457e83ecae9736e976b9aadd9a5beef420fa8fbad2

  • SHA512

    37e26ecb57cecf21d49e74cd6d6dfb94f7fc9e4221d6c29cd230c1dd7a87b1ba08c4b96a517e466f2054d687bc7673d50c269652836f8aca03b39680d0090f20

  • SSDEEP

    24576:7CBlWPmb60qqOyhvxUWn5olFKV6k8q6txiMu:4WuxqqdhvF2lFVXL9u

Score
8/10

Malware Config

Signatures

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 IoCs

Processes

  • com.smartprojects.RootCleaner
    1⤵
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4486

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads