Analysis

  • max time kernel
    21s
  • max time network
    165s
  • platform
    android_x64
  • resource
    android-x64-20231215-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20231215-enlocale:en-usos:android-10-x64system
  • submitted
    03/02/2024, 22:00

General

  • Target

    ebd91fc1ba479fe561ead6a9efa0a27a8e979ab818c656141b2a67a22f12013c.apk

  • Size

    2.5MB

  • MD5

    5d359c03997637b9cd027de9827837d9

  • SHA1

    ee51b3b3ed228535cb5d0e8d3d623878e7ee4de5

  • SHA256

    ebd91fc1ba479fe561ead6a9efa0a27a8e979ab818c656141b2a67a22f12013c

  • SHA512

    a156ff3397dc828e533b78aa024a707ee5492f08d0923037fc2c8b08934ec0a03f1aabd3be3b8490493a57c07b73e7a817e45fdf746a75c105f366e2d88db5f1

  • SSDEEP

    49152:2EKm+LHs6DQnOD9ktDrmCvXv/uOtjoL4UeqMb+bHgxDvtK:2EKm+D0nODoX2OtFZb9lK

Score
7/10

Malware Config

Signatures

  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Reads information about phone network operator.
  • Listens for changes in the sensor environment (might be used to detect emulation) 1 IoCs

Processes

  • in.remoteworld.www.starremote
    1⤵
    • Loads dropped Dex/Jar
    • Listens for changes in the sensor environment (might be used to detect emulation)
    PID:4961

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/in.remoteworld.www.starremote/[email protected]

    Filesize

    2.2MB

    MD5

    3c2b50d5e757a23a7bbaf25f366793e6

    SHA1

    dc2b637697596b4c812d2dba629d89c5d9984947

    SHA256

    cb4fa2085445849b0830572cd77fd7472cae1bca0f7af6ea37c46c4730b46923

    SHA512

    f790b52cabb7e711b0928ad01eb65627ab600255fdbdbe95902e39fdfd3449637896ff330deee53e66d7a2ce457ce2d79d8b7fa526127201a0b1a71473b2d000