Analysis
-
max time kernel
148s -
max time network
155s -
platform
android_x64 -
resource
android-x64-20231215-en -
resource tags
androidarch:x64arch:x86image:android-x64-20231215-enlocale:en-usos:android-10-x64system -
submitted
19-02-2024 22:03
Behavioral task
behavioral1
Sample
82afec8389098cdd76bcf41eee2b95e61c7da73bead137ee9f8951088cf23199.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
82afec8389098cdd76bcf41eee2b95e61c7da73bead137ee9f8951088cf23199.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
82afec8389098cdd76bcf41eee2b95e61c7da73bead137ee9f8951088cf23199.apk
Resource
android-x64-arm64-20231215-en
General
-
Target
82afec8389098cdd76bcf41eee2b95e61c7da73bead137ee9f8951088cf23199.apk
-
Size
752KB
-
MD5
9aaeae7011d7f2e3408af0d3b4e41a1b
-
SHA1
866a4e46c2bced964d188aa4ce4bf1ee23448b35
-
SHA256
82afec8389098cdd76bcf41eee2b95e61c7da73bead137ee9f8951088cf23199
-
SHA512
72083aab228281db427e19c7b3e0227a5559cdc91a513e52ed9d4f592e510afa8cc0e45cd1e09432d02410df7c4fc594e1f42d4d30c17794186e0fca1e7d546a
-
SSDEEP
12288:drMnLa1a8LresExI3Zo5WmpYshXZPbGwidNpge:doLa1a2es0I3Zo5WmD9idNp9
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 IoCs
Processes:
cmf0.c3b5bm90zq.patchdescription ioc process Framework service call android.content.pm.IPackageManager.getInstalledApplications cmf0.c3b5bm90zq.patch