Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    android_x64
  • resource
    android-x64-20240221-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system
  • submitted
    22-02-2024 22:03

General

  • Target

    e3273a54f72486c2937b52cfcc87331fb5324db75b2c29e7fa13bf420bd82061.apk

  • Size

    591KB

  • MD5

    40723ea13ff46a78f7b122fdee2803fd

  • SHA1

    372bc8d61c56bde9a9ab6545121aafc707e28f50

  • SHA256

    e3273a54f72486c2937b52cfcc87331fb5324db75b2c29e7fa13bf420bd82061

  • SHA512

    791577c6a12e1e2f25620f773329279dcab4344e4034999e8c9ff8f2cd8b65f5bc372a28c83eea4c069ee1061530c1d94d0315a5b8865e562c7fb1df4e91025a

  • SSDEEP

    12288:W5AAvIq/R4Mb28zqU9ulzqN437UlbCaXlXNBdZ:kPvgMJuUglzqNI2bvlZ

Malware Config

Signatures

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs 1 IoCs
  • Removes its main activity from the application launcher 1 IoCs

Processes

  • cmf0.c3b5bm90zq.patch
    1⤵
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
    • Removes its main activity from the application launcher
    PID:5048

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads