Analysis

  • max time kernel
    2788099s
  • max time network
    161s
  • platform
    android_x64
  • resource
    android-x64-20231215-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20231215-enlocale:en-usos:android-10-x64system
  • submitted
    24/12/2023, 06:25

General

  • Target

    e6fe6a187b7942aca2c3d69109f19b6e13c854fbf685102154f2a5399481303f.apk

  • Size

    4.5MB

  • MD5

    72a3ee1bf02b6d55572d75ba7187a4dd

  • SHA1

    f41162b2f5dff57a0af9ee79860d6d2473439b7c

  • SHA256

    e6fe6a187b7942aca2c3d69109f19b6e13c854fbf685102154f2a5399481303f

  • SHA512

    b1860960e16e22b8797b9f856e130b2c1a40af3218fd904e29296db7ae21028c0079a186f71ab3b0bccb03722aaa42a85423fd27f8881122bae00f61758c7054

  • SSDEEP

    98304:5aeZW4Rt1viNmWQiYOW6waYZp9jPGfeTkAqw+fQg:AclqFQifW6LWLLGfeTkm6n

Score
8/10

Malware Config

Signatures

  • Requests cell location 1 IoCs

    Uses Android APIs to to get current cell location.

  • Reads information about phone network operator.
  • Uses Crypto APIs (Might try to encrypt user data) 1 IoCs

Processes

  • com.example.theantofcar
    1⤵
    • Requests cell location
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:5003

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.example.theantofcar/files/libcuid.so

    Filesize

    109B

    MD5

    1feb6a65184fc45f869d2db8f43f3240

    SHA1

    97ec7919fe4dc6fd8eb6ef418f91908bc23f3167

    SHA256

    6541d5a749da0a160983026c0f6f35ecd585fd4aa23c863585ada2ccd9a36235

    SHA512

    1656ab554a22f7bc2cee11ef6c21126cb6d5b20df875b695ef4186b1df5d3461dd306a06a8f5d867b0b7015bd83e2de3f8dfb571e511d9259b830fd6c7598579