Analysis
-
max time kernel
3021429s -
max time network
130s -
platform
android_x86 -
resource
android-x86-arm-20231215-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20231215-enlocale:en-usos:android-9-x86system -
submitted
24-12-2023 05:38
Static task
static1
Behavioral task
behavioral1
Sample
de9e3669d540896ef5b86f792a93c9764a205b2323b03fbf80b84dc37ed146b0.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
gdtadv2.apk
Behavioral task
behavioral3
Sample
gdtadv2.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral4
Sample
gdtadv2.apk
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral5
Sample
sdk.apk
Behavioral task
behavioral6
Sample
sdk.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral7
Sample
sdk.apk
Resource
android-x64-arm64-20231215-en
General
-
Target
de9e3669d540896ef5b86f792a93c9764a205b2323b03fbf80b84dc37ed146b0.apk
-
Size
9.0MB
-
MD5
94b91dc85cd96ee27767cf5298384997
-
SHA1
d170c8956100c51b9809e72e774d4bd987fe73ab
-
SHA256
de9e3669d540896ef5b86f792a93c9764a205b2323b03fbf80b84dc37ed146b0
-
SHA512
d959d6cfafa00426961fda24548f7cf6fa1040724f7b090ef65b210b3866bc3ca1f7eaa7a1d32af51e61a0910042286dd82ac23a00cd7799f85048648880c39b
-
SSDEEP
196608:rTWxDOA+b4PGnSm+J6kps9TPZThCaXUXA25N1xXoYaox+:2ZOT5Sdkkpc/NEQ2NDXoYaox+
Malware Config
Signatures
-
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.ddz.mobile
Processes
-
com.ddz.mobile1⤵
- Uses Crypto APIs (Might try to encrypt user data)
PID:4254 -
/system/bin/sh -c getprop ro.board.platform2⤵PID:4283
-
-
getprop ro.board.platform2⤵PID:4283
-
-
logcat -d -v threadtime2⤵PID:4330
-
-
logcat -d -v threadtime2⤵PID:4344
-
-
/system/bin/sh -c getprop ro.miui.ui.version.name2⤵PID:4371
-
-
getprop ro.miui.ui.version.name2⤵PID:4371
-
-
/system/bin/sh -c getprop ro.build.version.emui2⤵PID:4398
-
-
getprop ro.build.version.emui2⤵PID:4398
-
-
/system/bin/sh -c getprop ro.lenovo.series2⤵PID:4422
-
-
getprop ro.lenovo.series2⤵PID:4422
-
-
/system/bin/sh -c getprop ro.build.nubia.rom.name2⤵PID:4446
-
-
getprop ro.build.nubia.rom.name2⤵PID:4446
-
-
/system/bin/sh -c getprop ro.meizu.product.model2⤵PID:4471
-
-
getprop ro.meizu.product.model2⤵PID:4471
-
-
/system/bin/sh -c getprop ro.build.version.opporom2⤵PID:4497
-
-
getprop ro.build.version.opporom2⤵PID:4497
-
-
/system/bin/sh -c getprop ro.vivo.os.build.display.id2⤵PID:4522
-
-
getprop ro.vivo.os.build.display.id2⤵PID:4522
-
-
/system/bin/sh -c getprop ro.aa.romver2⤵PID:4547
-
-
getprop ro.aa.romver2⤵PID:4547
-
-
/system/bin/sh -c getprop ro.lewa.version2⤵PID:4575
-
-
getprop ro.lewa.version2⤵PID:4575
-
-
/system/bin/sh -c getprop ro.gn.gnromvernumber2⤵PID:4599
-
-
getprop ro.gn.gnromvernumber2⤵PID:4599
-
-
/system/bin/sh -c getprop ro.build.tyd.kbstyle_version2⤵PID:4632
-
-
getprop ro.build.tyd.kbstyle_version2⤵PID:4632
-
-
/system/bin/sh -c getprop ro.build.fingerprint2⤵PID:4656
-
-
getprop ro.build.fingerprint2⤵PID:4656
-
-
/system/bin/sh -c getprop ro.build.rom.id2⤵PID:4681
-
-
getprop ro.build.rom.id2⤵PID:4681
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD53e2b7fc0c1f8a39b00a99e30d1b4a7a5
SHA138995b0361ad0e9042eb9fb64f4beef22d1cdd2e
SHA2562eb5da5906639ca354e79d72abe06423ab6af0ecf67bea768feb5cc99a451c7e
SHA512ce30fb4fb50e01bbde29348e228f0ab8182ba65833639618c443d314a676c2a857ebfbfcd5101b1d8af497bb92e2975c740cd8abd6ebb4453318f99b5906a252
-
Filesize
28KB
MD5cf845a781c107ec1346e849c9dd1b7e8
SHA1b44ccc7f7d519352422e59ee8b0bdbac881768a7
SHA25618619b678a5c207a971a0aa931604f48162e307c57ecdec450d5f095fe9f32c7
SHA5124802861ea06dc7fb85229a3c8f04e707a084f1ba516510c6f269821b33c8ee4ebf495258fe5bee4850668a5aac1a45f0edf51580da13b7ee160a29d067c67612
-
Filesize
84KB
MD555cc401ee2a743646aca2d2bea5a6f6c
SHA114bb5bab6acb525adf969c580d2913c34afbc663
SHA2566666cf3fa3b6274c105ddf8eeac67c0b388eac3459ed1d8d93cdfafced00d83f
SHA512525020804011e8f8ffc3e95fbed1e64e13ecfc133c0119873db3d3910134b34f3d59f17167d752b5ad6e6c06e284156f7b5dfa78e476e80c28f781f78a7543f3