Analysis
-
max time kernel
2s -
max time network
155s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
28-03-2024 11:13
General
-
Target
ready.apk
-
Size
6.2MB
-
MD5
5f1f8b818bedf4fcd821d7707ea22de5
-
SHA1
bb40aefe9928dfd0ebe134ac7688c2b2df5525f0
-
SHA256
e301a0060bb7754d975c243e3753f783031283e4471e751ced3e774c9f308146
-
SHA512
648dff42426235bebaa0e9a595566a7f4c72fa9a183981609fcbda2f32dd2ee73542329b832defc1c688f1ef595e3f46a3362b926a84ab1b92abc8b5f73369bd
-
SSDEEP
24576:V9pFYY7mWiz8JRFzzLr84UorMqWNb4/extQZM8XQMwx:V9pRR9r84UKzWTxt+C
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs 1 IoCs
Processes:
vibrators.invoice.givingdescription ioc process Framework service call android.content.pm.IPackageManager.getInstalledApplications vibrators.invoice.giving