Analysis
-
max time kernel
153s -
max time network
135s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
29-02-2024 22:00
Behavioral task
behavioral1
Sample
1eda76d0de423c9b5da8090fc0d5fe881d4ef8ee57160f2b0317130b958737c6.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
1eda76d0de423c9b5da8090fc0d5fe881d4ef8ee57160f2b0317130b958737c6.apk
Resource
android-x64-20240221-en
General
-
Target
1eda76d0de423c9b5da8090fc0d5fe881d4ef8ee57160f2b0317130b958737c6.apk
-
Size
744KB
-
MD5
8ce1e12b7cff30516cb00330daa10e7d
-
SHA1
653a6711682191fa649dbbb9b22d42d37a0be343
-
SHA256
1eda76d0de423c9b5da8090fc0d5fe881d4ef8ee57160f2b0317130b958737c6
-
SHA512
1c199e6efd18ac37ed68086f278507f4c4f8cfb3f6784d48c6070b9b2963cf46e85213ab7956d6c9dd34421d0116a03e999712289e009ddbff3567bbf5e5394a
-
SSDEEP
12288:usZmRGkBX0yh2+x6FQhl0atESsJrdggJP1jjXaLtFB2:usZmJSywW6KX0atESqygJPVXaZv2
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs 1 IoCs
Processes:
cmf0.c3b5bm90zq.patchdescription ioc process Framework service call android.content.pm.IPackageManager.getInstalledApplications cmf0.c3b5bm90zq.patch -
Processes:
cmf0.c3b5bm90zq.patchpid process 5055 cmf0.c3b5bm90zq.patch