Analysis

  • max time kernel
    2803251s
  • max time network
    130s
  • platform
    android_x86
  • resource
    android-x86-arm-20231215-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20231215-enlocale:en-usos:android-9-x86system
  • submitted
    23/12/2023, 13:34

General

  • Target

    AlipayMSP090_PPTV_V3.5.2.0424.apk

  • Size

    350KB

  • MD5

    4299fba05928ff389bbd58a235f74c86

  • SHA1

    c4ddad6c8872985bb2f50b94aa87046778034faa

  • SHA256

    a125388128d681bc47d00bdf2df30b20a12d187681db593c508126af472eda24

  • SHA512

    05c4c4b8072a718998072d5442efcb6ae817217478e3cd485e5d80c674d0081dc72561df7726985036746a7fe044153f8ec3faf9add3498bc49e3a71e650a112

  • SSDEEP

    6144:QfJiREH0/sEGId2fuRmlxLwEd0r2sfS4QlV7G8v9oKvFuQL2bBV2fnbJk:QfJisFEGc2yms5a4QlV7G8Ge62fnbu

Score
8/10

Malware Config

Signatures

  • Requests cell location 1 IoCs

    Uses Android APIs to to get current cell location.

Processes

  • com.alipay.android.app
    1⤵
    • Requests cell location
    PID:4474

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • /storage/emulated/0/alipay/logs/2023-12-26/17-5-0.log

          Filesize

          279B

          MD5

          d955d3ebc3d71642c8cac542b2db3874

          SHA1

          8ad64e2904d14838aa84222b8033683dc639a78a

          SHA256

          9180262631f8c02a55f2eff63e50cc84b73073f1cdc622763b154781b779a3f0

          SHA512

          187fe6b4aaba91f3ee516d4b0a68562ec8582081a5585da43271ada316bf67237fb5d5af9635ec8f096cb5d15c626cc5a428a74a220eb245ebd3e4eab788eff0