Analysis
-
max time kernel
150s -
max time network
155s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
27-02-2024 22:01
Behavioral task
behavioral1
Sample
94ab4c0da44d5b4a05acb983586c6b1e0e1fbc528bd3f33df317759d8d03ff2c.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
94ab4c0da44d5b4a05acb983586c6b1e0e1fbc528bd3f33df317759d8d03ff2c.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
94ab4c0da44d5b4a05acb983586c6b1e0e1fbc528bd3f33df317759d8d03ff2c.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
94ab4c0da44d5b4a05acb983586c6b1e0e1fbc528bd3f33df317759d8d03ff2c.apk
-
Size
760KB
-
MD5
51414efef6663e29e7c9e17b85c5b189
-
SHA1
dd0038c8d87027eadb71080f74877e203503572e
-
SHA256
94ab4c0da44d5b4a05acb983586c6b1e0e1fbc528bd3f33df317759d8d03ff2c
-
SHA512
ee2c89dc43d17e167f1b88129e77b1edcc5918fdc05ac7f39af16d20d200e607945e7ab9ab31b6c8987fd90f6d47bc1162037d911331da7f8268e4a6bd197bea
-
SSDEEP
12288:FXsma1a8LVePnTPDkke5WmpYshXZPbGwidNpgj:F5a1aKePbDkke5WmD9idNpI
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs 1 IoCs
Processes:
cmf0.c3b5bm90zq.patchdescription ioc process Framework service call android.content.pm.IPackageManager.getInstalledApplications cmf0.c3b5bm90zq.patch