Analysis
-
max time kernel
158s -
max time network
133s -
platform
android_x64 -
resource
android-x64-arm64-20231215-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20231215-enlocale:en-usos:android-11-x64system -
submitted
20-02-2024 22:00
Behavioral task
behavioral1
Sample
3e6a03a6cbf3fc823a44efcad0d761bf881919ea3299efc3b8ccc3d9d419c199.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
3e6a03a6cbf3fc823a44efcad0d761bf881919ea3299efc3b8ccc3d9d419c199.apk
Resource
android-x64-20231215-en
General
-
Target
3e6a03a6cbf3fc823a44efcad0d761bf881919ea3299efc3b8ccc3d9d419c199.apk
-
Size
760KB
-
MD5
a966f0b67527bc0c16e5198b956d143c
-
SHA1
025721277d8dbcf74c062df45a8bcfb4b6b0ec1d
-
SHA256
3e6a03a6cbf3fc823a44efcad0d761bf881919ea3299efc3b8ccc3d9d419c199
-
SHA512
365bd1a3a6bcb38bf790e5a3121a704021724fbab555e424ca10995114ae0cafde34e765d029b569b6c55ab380fdba64478a93b340bba2be6a1e7e464118fa73
-
SSDEEP
12288:ZpMH8a1a8Lreac4kiN3u5WmpYshXZPbGwidNpgF:Zp7a1a2eaOiN3u5WmD9idNpm
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 IoCs
Processes:
cmf0.c3b5bm90zq.patchdescription ioc process Framework service call android.content.pm.IPackageManager.getInstalledApplications cmf0.c3b5bm90zq.patch -
Processes:
cmf0.c3b5bm90zq.patchpid process 4618 cmf0.c3b5bm90zq.patch