Analysis
-
max time kernel
2867283s -
max time network
130s -
platform
android_x86 -
resource
android-x86-arm-20231215-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20231215-enlocale:en-usos:android-9-x86system -
submitted
23/12/2023, 14:58
Static task
static1
Behavioral task
behavioral1
Sample
3765e4a0e583510bbe2922a8c010bee04bb3e96da7b050d2865c87b81af056c7.apk
Resource
android-x86-arm-20231215-en
General
-
Target
3765e4a0e583510bbe2922a8c010bee04bb3e96da7b050d2865c87b81af056c7.apk
-
Size
6.2MB
-
MD5
3142092346d2ee17b2b5496527301cc9
-
SHA1
6a31292826cf37a24de113199e9eefef4592e37e
-
SHA256
3765e4a0e583510bbe2922a8c010bee04bb3e96da7b050d2865c87b81af056c7
-
SHA512
d751a5926086de138513afeae2170848c711c61ae65068f5136262e30daa40757c1094ee0cd640a1846cb7ffc02f831bcee732146edaa83e4f048b430b12b3c4
-
SSDEEP
196608:igg1K7rwV04y+75pE1ONZESuL1pmeMUtSkBy1j/:5g1K7rwVXy+75w6EdLdMUQk81j/
Malware Config
Signatures
-
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.mgyun.shua
Processes
-
com.mgyun.shua1⤵
- Uses Crypto APIs (Might try to encrypt user data)
PID:4257 -
/system/bin/sh -c getprop ro.board.platform2⤵PID:4289
-
-
getprop ro.board.platform2⤵PID:4289
-
-
/system/bin/sh -c type su2⤵PID:4315
-
-
logcat -d -v threadtime2⤵PID:4342
-
-
logcat -d -v threadtime2⤵PID:4360
-
-
/system/bin/sh -c getprop ro.miui.ui.version.name2⤵PID:4383
-
-
getprop ro.miui.ui.version.name2⤵PID:4383
-
-
/system/bin/sh -c getprop ro.build.version.emui2⤵PID:4410
-
-
getprop ro.build.version.emui2⤵PID:4410
-
-
/system/bin/sh -c getprop ro.lenovo.series2⤵PID:4435
-
-
getprop ro.lenovo.series2⤵PID:4435
-
-
/system/bin/sh -c getprop ro.build.nubia.rom.name2⤵PID:4460
-
-
getprop ro.build.nubia.rom.name2⤵PID:4460
-
-
/system/bin/sh -c getprop ro.meizu.product.model2⤵PID:4490
-
-
getprop ro.meizu.product.model2⤵PID:4490
-
-
/system/bin/sh -c getprop ro.build.version.opporom2⤵PID:4514
-
-
getprop ro.build.version.opporom2⤵PID:4514
-
-
/system/bin/sh -c getprop ro.vivo.os.build.display.id2⤵PID:4539
-
-
getprop ro.vivo.os.build.display.id2⤵PID:4539
-
-
/system/bin/sh -c getprop ro.aa.romver2⤵PID:4563
-
-
getprop ro.aa.romver2⤵PID:4563
-
-
/system/bin/sh -c getprop ro.lewa.version2⤵PID:4597
-
-
getprop ro.lewa.version2⤵PID:4597
-
-
/system/bin/sh -c getprop ro.gn.gnromvernumber2⤵PID:4622
-
-
getprop ro.gn.gnromvernumber2⤵PID:4622
-
-
/system/bin/sh -c getprop ro.build.tyd.kbstyle_version2⤵PID:4647
-
-
getprop ro.build.tyd.kbstyle_version2⤵PID:4647
-
-
/system/bin/sh -c getprop ro.build.fingerprint2⤵PID:4677
-
-
getprop ro.build.fingerprint2⤵PID:4677
-
-
/system/bin/sh -c getprop ro.build.rom.id2⤵PID:4701
-
-
getprop ro.build.rom.id2⤵PID:4701
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5497e1a73d7e120b62fb38711f3781e1b
SHA15002e0f630414a50080303315b0bccb1f0f2ac7d
SHA256f5be3e13132510539af5d15e1e831bf0374e4b3facbab5583b74668a0c9568f4
SHA5121b853345167137a8bd6c0589c57f69ae77c7afe194ed881b1fff167edfefae86679a8b0ed7c4e858a6d63e7444eab509db269f157bbfe80b51daa9b6a5659046
-
Filesize
28KB
MD5cf845a781c107ec1346e849c9dd1b7e8
SHA1b44ccc7f7d519352422e59ee8b0bdbac881768a7
SHA25618619b678a5c207a971a0aa931604f48162e307c57ecdec450d5f095fe9f32c7
SHA5124802861ea06dc7fb85229a3c8f04e707a084f1ba516510c6f269821b33c8ee4ebf495258fe5bee4850668a5aac1a45f0edf51580da13b7ee160a29d067c67612
-
Filesize
48KB
MD578ea1ed4f7f5d44d3a8643bc0d37927d
SHA17a9a592d97082916aeeb2aac8a623a04ac51459c
SHA2560810eada90beef456fafeac37b003c8f4c7525b6e7db7253e8484f0756d5859b
SHA512afd823197c5a94af291b332f594693ccb16a1b3f1928f1cca7067ae6424c0fcde1c94cdf1db4fd466d985b29c01c1d730c42df935b341a720dcbb8f0c1592e52