Analysis
-
max time kernel
2610226s -
max time network
149s -
platform
android_x64 -
resource
android-x64-arm64-20231215-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20231215-enlocale:en-usos:android-11-x64system -
submitted
23/12/2023, 19:13
Static task
static1
Behavioral task
behavioral1
Sample
73f3f3dc778ed748a89837aa00a9940eeef889af95af0d7863a9ea2b9d020a8f.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
73f3f3dc778ed748a89837aa00a9940eeef889af95af0d7863a9ea2b9d020a8f.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
73f3f3dc778ed748a89837aa00a9940eeef889af95af0d7863a9ea2b9d020a8f.apk
Resource
android-x64-arm64-20231215-en
General
-
Target
73f3f3dc778ed748a89837aa00a9940eeef889af95af0d7863a9ea2b9d020a8f.apk
-
Size
16.6MB
-
MD5
38f0fccc36091be867c2e4d47a75d959
-
SHA1
206d91d82ea2d54d7ae79b096aca2a67d045df10
-
SHA256
73f3f3dc778ed748a89837aa00a9940eeef889af95af0d7863a9ea2b9d020a8f
-
SHA512
b0093b8e590c19b545e7c2157c93edd4de089db38b2b6d746248142d05c0ad8b941520fd20566f8dedf21c8f5fc8a9e765b660e988f1129a77b63a07dded476d
-
SSDEEP
393216:ZK6+sQY7jqRX61fROFHaEuP58hLv7UFKXKDZ01Q:PEY7jqRqBR8aEuKN7FXGZ01Q
Malware Config
Signatures
-
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.andromo.dev623844.app824164
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99B
MD54b9d0b2e9aeb6e1088a457afa8f5b1f4
SHA1616daa378473671a0f23891bd7625fd68c317c33
SHA2566e4cfaf5b5f8b905df7d2a844a1bb3a4659d00db2bd1d283aecf089a21d8bb33
SHA5124c5a7733d8f34685c40e3b75797a512348f02ecb427ab6e2ef48c2fe527fd44c3efbbf826b02c4a4195a160c940424f953f0c3f973634af7c44240d2edd69b80