Analysis

  • max time kernel
    4122051s
  • max time network
    134s
  • platform
    android_x64
  • resource
    android-x64-arm64-20231215-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20231215-enlocale:en-usos:android-11-x64system
  • submitted
    10/01/2024, 23:22

General

  • Target

    51e75d50a9060dcd688f529fdd9fc35e.apk

  • Size

    1.4MB

  • MD5

    51e75d50a9060dcd688f529fdd9fc35e

  • SHA1

    70b2d6c6cc945790f543ae8cb6b308a5f7311b37

  • SHA256

    a8655f0b481d9e61dfbd733000a2e9e86996e10593084847e4bda0ebf8cad1b4

  • SHA512

    56a5d5f3061d34e782afb121bb1d353c1990e436c0738e04fd3970b01dec12a65acef0ab8e2509a15d39d91db84f8630f85fe93e8972317fc740f6577860ef41

  • SSDEEP

    24576:TE5GRmmZ8W5gz0NukRuqRm1hMUqAlWjaxuqbYLRMRPwA3hu3L9E:I5GMmH5i40qRm1hMlAlPHYVMRPwARu5E

Score
6/10

Malware Config

Signatures

  • Reads device software version 1 IoCs

    Uses Android APIs to read software version number for the device (IMEI/SV for GSM devices).

  • Reads information about phone network operator.
  • Uses Crypto APIs (Might try to encrypt user data) 1 IoCs

Processes

  • com.chengda.enterprisenewpager.view
    1⤵
    • Reads device software version
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4597

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • /data/user/0/com.chengda.enterprisenewpager.view/files/CNZZEvents_1704928980241

          Filesize

          102B

          MD5

          9fb1625443c5febc469ea384fa8a10b0

          SHA1

          7cf7a08eac20a4bbfe5cd159fa00a7ded500faa2

          SHA256

          42ffdaf45441a374f932c0301eacc649d4561995efef7e161acee30af3ec91b1

          SHA512

          f052c2813867446e034427caac25ac0a0084b2c914a851eac68a7ca55a72ede60795ca8c29d6e933dd9a043734513a6e556020332a43035bba1e7449a4f5984d