Analysis
-
max time kernel
102s -
max time network
153s -
platform
android_x64 -
resource
android-x64-20231215-en -
resource tags
androidarch:x64arch:x86image:android-x64-20231215-enlocale:en-usos:android-10-x64system -
submitted
18-02-2024 22:03
Behavioral task
behavioral1
Sample
88646f3e3935d0b617059aaa9b4b4076d29d86aae524a107273d7d93b0d99f52.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
88646f3e3935d0b617059aaa9b4b4076d29d86aae524a107273d7d93b0d99f52.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
88646f3e3935d0b617059aaa9b4b4076d29d86aae524a107273d7d93b0d99f52.apk
Resource
android-x64-arm64-20231215-en
General
-
Target
88646f3e3935d0b617059aaa9b4b4076d29d86aae524a107273d7d93b0d99f52.apk
-
Size
775KB
-
MD5
69fb688e8ccce0cee812c5dedfa6c8f2
-
SHA1
6a650c8965e6500df827cd7866b4ad30f9fbabe7
-
SHA256
88646f3e3935d0b617059aaa9b4b4076d29d86aae524a107273d7d93b0d99f52
-
SHA512
81ef781f1546d028a8d1e2368b7b0c66ba2636cc304fcdc71b2ee89f8a607ca6a87713a299fd4bee5c42bee772ffd8a74df1ec57f6dc5a58600731320c7efd74
-
SSDEEP
12288:+k2NAHua1a8Ldesw66fhMLFf5WmpYshXZPbGwidNpgi:tlOa1a6eswRfhML55WmD9idNpp
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 IoCs
Processes:
cmf0.c3b5bm90zq.patchdescription ioc process Framework service call android.content.pm.IPackageManager.getInstalledApplications cmf0.c3b5bm90zq.patch