Analysis

  • max time kernel
    4122041s
  • max time network
    143s
  • platform
    android_x86
  • resource
    android-x86-arm-20231215-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20231215-enlocale:en-usos:android-9-x86system
  • submitted
    10-01-2024 23:22

General

  • Target

    51e75d50a9060dcd688f529fdd9fc35e.apk

  • Size

    1.4MB

  • MD5

    51e75d50a9060dcd688f529fdd9fc35e

  • SHA1

    70b2d6c6cc945790f543ae8cb6b308a5f7311b37

  • SHA256

    a8655f0b481d9e61dfbd733000a2e9e86996e10593084847e4bda0ebf8cad1b4

  • SHA512

    56a5d5f3061d34e782afb121bb1d353c1990e436c0738e04fd3970b01dec12a65acef0ab8e2509a15d39d91db84f8630f85fe93e8972317fc740f6577860ef41

  • SSDEEP

    24576:TE5GRmmZ8W5gz0NukRuqRm1hMUqAlWjaxuqbYLRMRPwA3hu3L9E:I5GMmH5i40qRm1hMlAlPHYVMRPwARu5E

Score
6/10

Malware Config

Signatures

  • Queries the unique device ID (IMEI, MEID, IMSI)
  • Reads information about phone network operator.
  • Uses Crypto APIs (Might try to encrypt user data) 1 IoCs

Processes

  • com.chengda.enterprisenewpager.view
    1⤵
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4202

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.chengda.enterprisenewpager.view/files/CNZZSendEvents

    Filesize

    150B

    MD5

    f1db6db33b7fe2c20432ae47bff9a5dd

    SHA1

    39da7ddc3ad4866edbb9df59b696cbe2cd3b61ae

    SHA256

    d451b90c4c777abfed08f8a0c8df8ed2a8f8b7480e3ba3352577f1064ad81672

    SHA512

    87cf4c312a3e94f626e471e39bf41950fc798845436a446f742c12e36e5e6b8c5585422fe1e373a5e67c2365f80953fcb940d999a5fed4ec9250a4f96a0df83f