Analysis

  • max time kernel
    153s
  • max time network
    149s
  • platform
    android_x64
  • resource
    android-x64-20240221-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system
  • submitted
    26-02-2024 22:07

General

  • Target

    0bc6a18c026532dfc947353cee8bce13ac60960474aca808786910f09ceedfec.apk

  • Size

    3.1MB

  • MD5

    c42b44866924d3108a6ce8f80a5c7bb3

  • SHA1

    fc1ffc20f850acd43d495a086272557b034b6ad9

  • SHA256

    0bc6a18c026532dfc947353cee8bce13ac60960474aca808786910f09ceedfec

  • SHA512

    ed2aacc78c326d9c973334d85a48f0ca107eec9ff83023a05edb4d36ba48f101dbac69911417dd51407f38fa01741d64736dff8182ce708664b7db754b78c98b

  • SSDEEP

    49152:eCIXsZo5EEztRv1E4dG4NWLUaBkmvNZMSw4+sQZoBKnCniDzCWYFQ/YgJPmN:N+rrvcBkei+Q+snCnsfdqN

Score
8/10

Malware Config

Signatures

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs 1 IoCs

Processes

  • com.google.services.com
    1⤵
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
    PID:5055

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /storage/emulated/0/droporgin/config26-02-2024.log
    Filesize

    63B

    MD5

    bf86e419be80d0b3f52c05fd03af7fda

    SHA1

    8cb3e36a6f66954214d9fb951bf4f8390e8ca91a

    SHA256

    a479571371a8e7cf07f95e5e2b50d8f22b2bbad2751714b74093f6a0a4a4e394

    SHA512

    484cd67f6c13cdf99330e06938b66bba1e5dcceb1a6ff37419c356c59992fe68e30bee8ee73855020b4e7d0039764384fb6e5e64e772cfcc61c989207c689170