Analysis
-
max time kernel
148s -
max time network
158s -
platform
android_x64 -
resource
android-x64-20231215-en -
resource tags
androidarch:x64arch:x86image:android-x64-20231215-enlocale:en-usos:android-10-x64system -
submitted
10-02-2024 22:03
Behavioral task
behavioral1
Sample
2281f9608537593a96dfd2df0102db13250ab5b59dbb273c612cffd340eb3d0c.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
2281f9608537593a96dfd2df0102db13250ab5b59dbb273c612cffd340eb3d0c.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
2281f9608537593a96dfd2df0102db13250ab5b59dbb273c612cffd340eb3d0c.apk
Resource
android-x64-arm64-20231215-en
General
-
Target
2281f9608537593a96dfd2df0102db13250ab5b59dbb273c612cffd340eb3d0c.apk
-
Size
760KB
-
MD5
28c40b4858d8e7bcb6b45d37a367efb1
-
SHA1
90905c21f613c46f52a33dd0d2c535a3113fd2cd
-
SHA256
2281f9608537593a96dfd2df0102db13250ab5b59dbb273c612cffd340eb3d0c
-
SHA512
929620b4c6088d7866b5cd6fab62a8d168a732b9582c111845a6d7211b9fb7b74d19c6fa91c2bc02ba1e6d345bacf7f4041697536470f19b7ec8e473c8d1f183
-
SSDEEP
12288:MIHzDia1a8LzebFD+Np2k5WmpYshXZPbGwidNpgf:MInia1amebYNp2k5WmD9idNpA
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 IoCs
Processes:
cmf0.c3b5bm90zq.patchdescription ioc process Framework service call android.content.pm.IPackageManager.getInstalledApplications cmf0.c3b5bm90zq.patch