Analysis
-
max time kernel
150s -
max time network
162s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
04-03-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
5cd6817c9d2ca2dd9eb087a48f14c2d03dd86b599c677c0ba1a7421fb3a78bb7.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
5cd6817c9d2ca2dd9eb087a48f14c2d03dd86b599c677c0ba1a7421fb3a78bb7.apk
Resource
android-x64-20240221-en
General
-
Target
5cd6817c9d2ca2dd9eb087a48f14c2d03dd86b599c677c0ba1a7421fb3a78bb7.apk
-
Size
3.1MB
-
MD5
a7798a95922876f54bc780dbad925e54
-
SHA1
c8b82ca47c7d660a83fdc5b1a03868f62d697ed0
-
SHA256
5cd6817c9d2ca2dd9eb087a48f14c2d03dd86b599c677c0ba1a7421fb3a78bb7
-
SHA512
91612359b2f949188f038cb42725ca3156e79cfac2b5d332e60390a956f41dc7c460908309a9a8781af5000b26700c9a434dbbb72002953a1ef8a14f6dcd67b2
-
SSDEEP
49152:5rpK9bGn50x25ej/cOSX/Jz34dFSiP8O4AsIBQ/d13H+oYlgSGFK:5rpKiJ5w/cpX/1I7tP8NAsIu/7OoYmFK
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs 1 IoCs
description ioc Process Framework service call android.content.pm.IPackageManager.getInstalledApplications com.example.bot -
pid Process 5119 com.example.bot
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD57959d37362f9775610d260244c6526e6
SHA1817ff1d203d4569394aed44b39770885bd38673e
SHA256386275476def623c1247ed822bcaec2b436a0c3c378eaae2ba0029e1a798d72c
SHA51238557ae8b2a5674d955f1d62173eec15abfc2779aa2346f82cedc8ee5a63e50840f61eb1d244501c246ea3012be7e198714c7bdc281bd3f8c7085c5211a3695a
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD51fcd60bb6b12279d43193871efe0ae66
SHA1f2ca6e719920e307c0523aaa1ab0a84a60ee4767
SHA256845589a2f1a03059ae723669f394472d72afd2223023a613bfd390768cf96c57
SHA51234050c073a54924239d89a5d283ba739d874f0db443f1ad221f6ace00564965701e30678cd0b41164b0b5c1b9f88e27f3399d6e7da1f919b9ead6ef9c1f5146c
-
Filesize
185KB
MD5a4cb39b297a69d5b42eaff1d2896a780
SHA1e0bd0840c9c572310e4beff4fb35d482d9931c5d
SHA256ab76b2b0e15b23a7b4167fc66145a6e069cff930017933879850050cd76e9fe9
SHA5125bd224f71e7f4228b960c0e683e49684ad5aa3663df07f1ee8e94afe32fa06bee0ced5cffd8843602db11ada6a2354a5d26ae92851e91716cfe1a8f648b5030c