Analysis
-
max time kernel
145s -
max time network
151s -
platform
android_x86 -
resource
android-x86-arm-20231215-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20231215-enlocale:en-usos:android-9-x86system -
submitted
16-02-2024 12:17
Behavioral task
behavioral1
Sample
a05d21746c3544b791069914774238b0.apk
Resource
android-x86-arm-20231215-en
android-9-x86
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
a05d21746c3544b791069914774238b0.apk
Resource
android-x64-20231215-en
android-10-x64
3 signatures
150 seconds
General
-
Target
a05d21746c3544b791069914774238b0.apk
-
Size
1.7MB
-
MD5
a05d21746c3544b791069914774238b0
-
SHA1
b3e828208106d0148eb8f0366d3dc66701c8b164
-
SHA256
fd19637e4cf7eeca5a713ad56971475e5571fa1af24afeba11cfc28b3c0d8aea
-
SHA512
4f21d957fb9ce645a3376c010d5ce2c55fc72d944690ee0339a9c647b3e2f3424889546c7ae4c0a6d0f3498fc2429acd666057e570e0a0e92c29d3c4cb98e493
-
SSDEEP
49152:34TNqElUb49sOxZ/6Q1sym8JeSa7WBhX/zyt:34goyUlFCy9pa6Yt
Malware Config
Signatures
-
Processes:
com.example.dat.a8andoserverxpid Process 4241 com.example.dat.a8andoserverx -
Acquires the wake lock 1 IoCs
Processes:
com.example.dat.a8andoserverxdescription ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.example.dat.a8andoserverx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs