Analysis
-
max time kernel
148s -
max time network
139s -
platform
android_x86 -
resource
android-x86-arm-20231215-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20231215-enlocale:en-usos:android-9-x86system -
submitted
17-02-2024 22:05
Behavioral task
behavioral1
Sample
950624f573a345116af34135aec1174b3cacf44635b89c3ea120273099bee4cd.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
950624f573a345116af34135aec1174b3cacf44635b89c3ea120273099bee4cd.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
950624f573a345116af34135aec1174b3cacf44635b89c3ea120273099bee4cd.apk
Resource
android-x64-arm64-20231215-en
General
-
Target
950624f573a345116af34135aec1174b3cacf44635b89c3ea120273099bee4cd.apk
-
Size
760KB
-
MD5
132f182a0e6b654dbdd93d68a9f18ded
-
SHA1
e69b0dabbe749c05c38200acd86ab0d45d48278f
-
SHA256
950624f573a345116af34135aec1174b3cacf44635b89c3ea120273099bee4cd
-
SHA512
dff45e75068e5e629abf2a34c9c6af1f465cdebeb5790c3f8c1c2d40501aec1d7f5672834d59153aa62b2c48a8003278821436bdd9484ccdb2e57ef31741c6a9
-
SSDEEP
12288:rxCa1a8LzepYhYHlOIaQ5WmpYshXZPbGwidNpgCkW:rga1amepNHlOIaQ5WmD9idNppkW
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 IoCs
Processes:
cmf0.c3b5bm90zq.patchdescription ioc process Framework service call android.content.pm.IPackageManager.getInstalledApplications cmf0.c3b5bm90zq.patch -
Tries to add a device administrator. 1 IoCs
Processes:
cmf0.c3b5bm90zq.patchdescription ioc process Intent action android.app.action.ADD_DEVICE_ADMIN cmf0.c3b5bm90zq.patch