Analysis

  • max time kernel
    3724931s
  • max time network
    164s
  • platform
    android_x64
  • resource
    android-x64-arm64-20231215-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20231215-enlocale:en-usos:android-11-x64system
  • submitted
    06/01/2024, 09:04

General

  • Target

    45d597a156b1628e0150389c371f39f9.apk

  • Size

    2.6MB

  • MD5

    45d597a156b1628e0150389c371f39f9

  • SHA1

    2aad9333fb1871b3511cebb8f734315fea13d38e

  • SHA256

    69b72b8350bae0fb786f507957846fc06db9e71c100de09d8c9e2174021aee25

  • SHA512

    047592c9877564cd7e74bfdffa664aad55be27745a81c5d8e214181907b20c7ed9ecb507ac5a81d0e84bc963480efc8f7a0180e2bbaad5cdd1bcb95d5b2aceb2

  • SSDEEP

    49152:x0Co3JKae2MCx9eNdOt4nQtqJHSfug/e05B20GvuDCk9HK5+VkiaOZtAhVK:x0N3J3eHKMdOO0q1SGJL9k9HK5+VkVK

Score
4/10

Malware Config

Signatures

  • Uses Crypto APIs (Might try to encrypt user data) 1 IoCs

Processes

  • com.cJT.aJWfPJkaY
    1⤵
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4626

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /storage/emulated/0/com.cJT.aJWfPJkaY/config/5ac714da7be6d534dd74c84a097f98e0

    Filesize

    352B

    MD5

    c2599d3ab4603d497952adadbd2345b1

    SHA1

    b70c2fbac30d852374cec1df424ebce820cb5f89

    SHA256

    48ee6a943203140312da8f81f29963563b2ca37990914fcb584a364cea6b98b8

    SHA512

    0d112f7d0334758542edfe992321a334a04f2b0bffab5aa551cfaca4287c8e28197360aca55b25ced9019f6092ca3192b2b9b86097f3c82d1b5acbfa796db0eb