Analysis
-
max time kernel
21s -
max time network
164s -
platform
android_x64 -
resource
android-x64-20231215-en -
resource tags
androidarch:x64arch:x86image:android-x64-20231215-enlocale:en-usos:android-10-x64system -
submitted
03-02-2024 10:17
Static task
static1
Behavioral task
behavioral1
Sample
Yellow-app-release.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
Yellow-app-release.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
Yellow-app-release.apk
Resource
android-x64-arm64-20231215-en
General
-
Target
Yellow-app-release.apk
-
Size
10.8MB
-
MD5
27317e8a5d860ca1f76c2692d1f0a7a5
-
SHA1
e0cf8c4f6c36df72a5a105b02051894a406e7c6f
-
SHA256
892cc593ffefa01a1f597cdd248d708bfd13768890295414a9a55e37938a4464
-
SHA512
a7eadf8ece7b80bd8a03d0f419604ed46e86aff03fa7951cd4e85e587a925250f01944aa48f7314a0a331e53845a87b11bc8c9cfa47e4540e0911fc7e89fa20b
-
SSDEEP
196608:ShGSO9oeBwHVceul4YrLYG28HUNIaTYu/y1LHqweT8uyOeAO:ShVmoRcfGgLY/Xi+gm5T8Hd
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 IoCs
description ioc Process Framework service call android.content.pm.IPackageManager.getInstalledApplications com.test3f.video -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.test3f.video/files/audience_network.dex 5110 com.test3f.video /data/user/0/com.test3f.video/files/audience_network.dex 5110 com.test3f.video -
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.test3f.video
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD55683d24fffa78f46f03f6cb49eaa6f1b
SHA169b592fec1459878a5956c374b19b05dc21a1149
SHA25663cf501c3d91219debe0d80f25fef52212f24d65d354320da95e6c327a182c3b
SHA512e54835c1bcfde3b9144c0689ed643372d593e332e7a661b0537ccaca274d8655f71994d9ff892dfbd4350f20293611c8889a0e558240ffe284d264fcacb70899
-
Filesize
8KB
MD5e4fe8bd16c241087a8e6e4982f860602
SHA138e704455ac6012c6269027a6d8a995e139491fa
SHA2568d29f106be396b24dd28037fcaade4ce3e709e6fed4f4fe65f148510c0520a72
SHA5121c7088dc6a054154ffb1f9c4c964c3673379c81d638481feafc5579011ee692ae4bc6f5fe5f152f3d7529d25ddfccf0f48db531c2bf7dd1d2643835d4360faac
-
Filesize
19KB
MD5ecd3f408571d82a4439945feecebcddd
SHA184a7d3f6fdb81b607e6e0fd14cd8ffee5a7ed97e
SHA2568cfdd903d3a263888907065a912b6566d826eb4cad8d00b51252a6400bcade60
SHA5121e05639521bee70c5dac472ddbc11be08f7c2210f1b43800d953e026c3affe8a4a1289ef35b6ba0960b7367ba5a7710beaec58850a3cd493e822fd2284436cc7
-
Filesize
120KB
MD540e712b8e55db4a5c3ec82fc8c556859
SHA1679be694b5fb9e5312744fc67ae46f2644a83b9f
SHA256a1a06243c3a4e1797f17f5eb638819294258f71fd73d4f490a24d522f43e94a3
SHA512ff7ed75f05d9f9b0898fbac7e6b4ffd5af062a0b85d43e90ea62db75cce3b09d21dd80d0dcc3ee44d27e84472ed7e35b1fb849faf79fc97f7e37748ba0a3d427
-
Filesize
3.1MB
MD57a1ef0317c0ec7ce434899af1a537aa7
SHA1905084f065b9c35ef15f04657bd6c560ee42d50a
SHA2565b6d9d6948dd0fb84712c2f6535593b8bc12b7ca152ccef7d6601c0f040b6deb
SHA5125642a88425742400607474d449c61bd10a6d608a970d96028899a3a3960428a3b5b50386e29e097285a706b6aa47d9b32f5a86b3d40d030f0f52f70aaf2dc4aa