Analysis
-
max time kernel
152s -
max time network
141s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
23/02/2024, 12:54
Static task
static1
Behavioral task
behavioral1
Sample
7df8648aa93d4822f57240945bc8c0e9f9061ede4bf222648ddaf447aafc19f4.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
7df8648aa93d4822f57240945bc8c0e9f9061ede4bf222648ddaf447aafc19f4.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
7df8648aa93d4822f57240945bc8c0e9f9061ede4bf222648ddaf447aafc19f4.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
7df8648aa93d4822f57240945bc8c0e9f9061ede4bf222648ddaf447aafc19f4.apk
-
Size
1.7MB
-
MD5
0bc239b57973aa3ff5ca773d668c4383
-
SHA1
f877aa3a3c7852a6a05d1cb0d9124d42fb3c8a02
-
SHA256
7df8648aa93d4822f57240945bc8c0e9f9061ede4bf222648ddaf447aafc19f4
-
SHA512
36df91e92eb99d3f921c9f16842de71943960bad156fec79017559396b8356d827e0b954ccda89bec9b04b7d00b664aef29a027552157f1d1f449373a58fb825
-
SSDEEP
24576:EWa7YCj6w/VSK94BU3wsUStw9exC4IfIBPGQc3HI4Yl0cEjha:E116w/UKhw4HxEfPv37Yl9Ej4
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.maxparking.nearme.gamecenter/files/d2b72774.dex 5218 com.maxparking.nearme.gamecenter -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.maxparking.nearme.gamecenter -
Reads information about phone network operator. 1 TTPs
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
381KB
MD5dee441b549ccb2e5729dd31059f7004e
SHA15397b50331d4548f9050ed789815c4b637080faf
SHA256843a48c33eb338ad447d61220d1b04bfd69465f4c01974035f3e77b979a04bf9
SHA512932eb33088ef91d2251ba99ac1c9dc25525821a80265a514edef58c21772c3e98dc6280a97f721303ea16a9d81652319dc70aa0bdc593251ba056669b3404d47