Analysis
-
max time kernel
153s -
max time network
164s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
01-03-2024 22:04
Behavioral task
behavioral1
Sample
25429c0b0330a1a7523654de83f2444309e91141df4efe4a82c061e7b0dafe12.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
25429c0b0330a1a7523654de83f2444309e91141df4efe4a82c061e7b0dafe12.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
25429c0b0330a1a7523654de83f2444309e91141df4efe4a82c061e7b0dafe12.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
25429c0b0330a1a7523654de83f2444309e91141df4efe4a82c061e7b0dafe12.apk
-
Size
750KB
-
MD5
7a9567d27e41ffab2b5a4f0f8ff3c5de
-
SHA1
61f001a9ceb1a8bc1e19ce5e94d2f2711830952b
-
SHA256
25429c0b0330a1a7523654de83f2444309e91141df4efe4a82c061e7b0dafe12
-
SHA512
14f83a0a7a936b6a22021f9836c3596dcc34ffcf0279830358a81793b3de44c06023d77276a248323ca72a15512488a206b485980629c1e528029d01709a7fe3
-
SSDEEP
12288:Q8eJ6sgRALz8wKWkfI5WmpYshXZPbGwidNpgV:Q7J6s7Lz87WkfI5WmD9idNpq
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs 1 IoCs
Processes:
cmf0.c3b5bm90zq.patchdescription ioc process Framework service call android.content.pm.IPackageManager.getInstalledApplications cmf0.c3b5bm90zq.patch