Analysis
-
max time kernel
3s -
max time network
150s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
13-03-2024 22:01
Behavioral task
behavioral1
Sample
a22f6141cc23358e5e9957985ab7591a490c7ccdd73931d83ae25071358a3cc7.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
a22f6141cc23358e5e9957985ab7591a490c7ccdd73931d83ae25071358a3cc7.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
a22f6141cc23358e5e9957985ab7591a490c7ccdd73931d83ae25071358a3cc7.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
a22f6141cc23358e5e9957985ab7591a490c7ccdd73931d83ae25071358a3cc7.apk
-
Size
748KB
-
MD5
54838da577a8dd4afc1e75dd43b73839
-
SHA1
940f57d6c15087ba5873bda2b3d8f18f32becc30
-
SHA256
a22f6141cc23358e5e9957985ab7591a490c7ccdd73931d83ae25071358a3cc7
-
SHA512
5de5c98f657db8021fd6408e4945bcfb8ca5d3ead0fd7b77efe767a18ee47c6c588ded4ed279eaf45f565921c61b8c0fcb94d8ea9fdc6e5d1f4f1aa939e2037b
-
SSDEEP
12288:X32aErEla1a8LdeXwhDlUM/5WmpYshXZPbGwidNpgYn:XmaEIla1a6eXQDlUM/5WmD9idNpj
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs 1 IoCs
Processes:
cmf0.c3b5bm90zq.patchdescription ioc process Framework service call android.content.pm.IPackageManager.getInstalledApplications cmf0.c3b5bm90zq.patch -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs