Analysis
-
max time kernel
147s -
max time network
138s -
platform
android_x86 -
resource
android-x86-arm-20231215-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20231215-enlocale:en-usos:android-9-x86system -
submitted
22-01-2024 22:01
Behavioral task
behavioral1
Sample
ae9629a0282692cfd71f4c9db75f86c9405e4286666577b6f509774af00b126c.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
ae9629a0282692cfd71f4c9db75f86c9405e4286666577b6f509774af00b126c.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
ae9629a0282692cfd71f4c9db75f86c9405e4286666577b6f509774af00b126c.apk
Resource
android-x64-arm64-20231215-en
General
-
Target
ae9629a0282692cfd71f4c9db75f86c9405e4286666577b6f509774af00b126c.apk
-
Size
772KB
-
MD5
ab41f5156cf3cc443ee1602464499ac2
-
SHA1
98f0737cb41d2a37ec7e24329062498cb1a5159c
-
SHA256
ae9629a0282692cfd71f4c9db75f86c9405e4286666577b6f509774af00b126c
-
SHA512
b54a94c0f2174ba205763f01c0cec1b30ca4c755d89a6044390a6a2f4d33fb11788b3219358dcd2bca4be3c2b40443e35c46c04d52510ee97b7dcb24687c6c5c
-
SSDEEP
12288:cusOIa1a8LzePgYJvfUllIG5WmpYshXZPbGwidNpgKq:cu1Ia1amePgY5fslIG5WmD9idNpnq
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 IoCs
Processes:
cmf0.c3b5bm90zq.patchdescription ioc process Framework service call android.content.pm.IPackageManager.getInstalledApplications cmf0.c3b5bm90zq.patch -
Requests enabling of the accessibility settings. 1 IoCs
Processes:
cmf0.c3b5bm90zq.patchdescription ioc process Intent action android.settings.ACCESSIBILITY_SETTINGS cmf0.c3b5bm90zq.patch -
Tries to add a device administrator. 1 IoCs
Processes:
cmf0.c3b5bm90zq.patchdescription ioc process Intent action android.app.action.ADD_DEVICE_ADMIN cmf0.c3b5bm90zq.patch