Analysis

  • max time kernel
    153s
  • max time network
    154s
  • platform
    android_x64
  • resource
    android-x64-20231215-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20231215-enlocale:en-usos:android-10-x64system
  • submitted
    18-02-2024 22:01

General

  • Target

    50d9d3d91bd584249700907fa6e74a9e1fd89d6690b713ec8ac0df83c7d0326e.apk

  • Size

    768KB

  • MD5

    5f8562a508568ad35734b292e68fe1fe

  • SHA1

    93bfbf2fb22717cf8d569ae33010699fc3e35d7c

  • SHA256

    50d9d3d91bd584249700907fa6e74a9e1fd89d6690b713ec8ac0df83c7d0326e

  • SHA512

    d7064895c1f44051814b83d2d1adb3ba8fbd01d5ead1261a1330e23c77afca16e215f986b12ace05dedd3ab1d5b6d9086ef24d17010a40d2f4cc5ce951ebd29f

  • SSDEEP

    12288:Qiaoj8VTCyPTTZzOhULX6BZRvS0q/193T6k8H:QfoQVuyPTpOMqBZRrq/fT6kO

Score
8/10

Malware Config

Signatures

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 IoCs
  • Removes its main activity from the application launcher 1 IoCs

Processes

  • cmf0.c3b5bm90zq.patch
    1⤵
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
    • Removes its main activity from the application launcher
    PID:5059

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads