Analysis

  • max time kernel
    2889914s
  • max time network
    131s
  • platform
    android_x64
  • resource
    android-x64-arm64-20231215-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20231215-enlocale:en-usos:android-11-x64system
  • submitted
    23-12-2023 13:02

General

  • Target

    1a43e498825b5cc080f5e7c1049cd8a05d987443b24f4bc025240976904a7166.apk

  • Size

    6.1MB

  • MD5

    8bd3c9ae6c2bc382bc894654a4e04a48

  • SHA1

    6068371e495b7259d086991125af343023e8536f

  • SHA256

    1a43e498825b5cc080f5e7c1049cd8a05d987443b24f4bc025240976904a7166

  • SHA512

    edcf776f53be111835a8a44defa609431122200935909c83e37567e6f494d04eb7609dfd8940d9a472a4da14ebdc7b31a99df64f9cbea02db4637e8fdc85c4fa

  • SSDEEP

    196608:RRmC8Fe+qNvIjgg+DVZpxXqgJWe9SpYHqsK73Y2g:7mCeqRE18Zhce8qHZJD

Score
8/10

Malware Config

Signatures

  • Requests cell location 1 IoCs

    Uses Android APIs to to get current cell location.

  • Reads information about phone network operator.
  • Uses Crypto APIs (Might try to encrypt user data) 1 IoCs

Processes

  • com.lvren
    1⤵
    • Requests cell location
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4591

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.lvren/files/__local_last_session.json

    Filesize

    128B

    MD5

    3b634fd793c15eb3479fc3b10b2ce76e

    SHA1

    38981527d211dc15c4db12ef01d0db2c7dcff61d

    SHA256

    acc2b894b24c242e8a4ed80c0c158b0f0eb742a6f64e7a99fdf0872092cc5637

    SHA512

    b489e1fb5f749e650778fa99d8309c65c7efda352115cfb5ff711bf4ff373a2a5097aaeda087cd7dc10f832323db6a39390dd826776b212b551fe7412f505c2c