Analysis
-
max time kernel
153s -
max time network
149s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
26-02-2024 22:07
Behavioral task
behavioral1
Sample
0bc6a18c026532dfc947353cee8bce13ac60960474aca808786910f09ceedfec.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
0bc6a18c026532dfc947353cee8bce13ac60960474aca808786910f09ceedfec.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
0bc6a18c026532dfc947353cee8bce13ac60960474aca808786910f09ceedfec.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
0bc6a18c026532dfc947353cee8bce13ac60960474aca808786910f09ceedfec.apk
-
Size
3.1MB
-
MD5
c42b44866924d3108a6ce8f80a5c7bb3
-
SHA1
fc1ffc20f850acd43d495a086272557b034b6ad9
-
SHA256
0bc6a18c026532dfc947353cee8bce13ac60960474aca808786910f09ceedfec
-
SHA512
ed2aacc78c326d9c973334d85a48f0ca107eec9ff83023a05edb4d36ba48f101dbac69911417dd51407f38fa01741d64736dff8182ce708664b7db754b78c98b
-
SSDEEP
49152:eCIXsZo5EEztRv1E4dG4NWLUaBkmvNZMSw4+sQZoBKnCniDzCWYFQ/YgJPmN:N+rrvcBkei+Q+snCnsfdqN
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs 1 IoCs
Processes:
com.google.services.comdescription ioc process Framework service call android.content.pm.IPackageManager.getInstalledApplications com.google.services.com
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/storage/emulated/0/droporgin/config26-02-2024.logFilesize
63B
MD5bf86e419be80d0b3f52c05fd03af7fda
SHA18cb3e36a6f66954214d9fb951bf4f8390e8ca91a
SHA256a479571371a8e7cf07f95e5e2b50d8f22b2bbad2751714b74093f6a0a4a4e394
SHA512484cd67f6c13cdf99330e06938b66bba1e5dcceb1a6ff37419c356c59992fe68e30bee8ee73855020b4e7d0039764384fb6e5e64e772cfcc61c989207c689170