Analysis
-
max time kernel
2s -
max time network
159s -
platform
android_x64 -
resource
android-x64-20231215-en -
resource tags
androidarch:x64arch:x86image:android-x64-20231215-enlocale:en-usos:android-10-x64system -
submitted
15-02-2024 22:02
Behavioral task
behavioral1
Sample
d9bda0ab6dfee51baeba25931819c8b2aed4d1d09d30a4953357a1d5979fcd7d.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
d9bda0ab6dfee51baeba25931819c8b2aed4d1d09d30a4953357a1d5979fcd7d.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
d9bda0ab6dfee51baeba25931819c8b2aed4d1d09d30a4953357a1d5979fcd7d.apk
Resource
android-x64-arm64-20231215-en
General
-
Target
d9bda0ab6dfee51baeba25931819c8b2aed4d1d09d30a4953357a1d5979fcd7d.apk
-
Size
760KB
-
MD5
788ae35d0b3819934b750349c3f30c3f
-
SHA1
d46cd254d2881da614256a41a0a7dd616f6117b3
-
SHA256
d9bda0ab6dfee51baeba25931819c8b2aed4d1d09d30a4953357a1d5979fcd7d
-
SHA512
cd81554dc5d8d59d1c45803edd5201fa14761499bcf12ab2a258be8f8cabe943364cc26f1d7339f1af365d75232e8e20b4725a8fde673b8007e9d2213f500508
-
SSDEEP
12288:/mOyEUJ6sgRALzcFMXpl7uy15WmpYshXZPbGwidNpg5:/nOJ6s7LzcQpluy15WmD9idNp2
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 IoCs
Processes:
cmf0.c3b5bm90zq.patchdescription ioc process Framework service call android.content.pm.IPackageManager.getInstalledApplications cmf0.c3b5bm90zq.patch