Analysis

  • max time kernel
    2531151s
  • max time network
    136s
  • platform
    android_x86
  • resource
    android-x86-arm-20231215-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20231215-enlocale:en-usos:android-9-x86system
  • submitted
    23-12-2023 13:18

General

  • Target

    1dc7050f60bc7e5a66e283b5401603dc6756735be069d76acc6a6ff4ea61533f.apk

  • Size

    24.6MB

  • MD5

    d775ea949b53c65ed455675e06428ea6

  • SHA1

    7b1af658e143d46d6dbb7802f28c53ef20e708cc

  • SHA256

    1dc7050f60bc7e5a66e283b5401603dc6756735be069d76acc6a6ff4ea61533f

  • SHA512

    a63d554c57db66afe56bebd4eb14c2fb81fdbae34ee35764f04c057de7d3214037ff5128a051302b9ec41e12020d3792d79defa8a1b686347bb2bb5f51dad4b7

  • SSDEEP

    786432:aB3NUws0zVz7h0fAqOpE34EKh1T6pZrKhJ:aB3Xhz7K4qOJ5h96D4

Score
8/10

Malware Config

Signatures

  • Requests cell location 1 IoCs

    Uses Android APIs to to get current cell location.

  • Listens for changes in the sensor environment (might be used to detect emulation) 1 IoCs

Processes

  • com.e8game.tlzt.aligames
    1⤵
    • Requests cell location
    • Listens for changes in the sensor environment (might be used to detect emulation)
    PID:4264

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads