Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    android_x64
  • resource
    android-x64-20240221-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system
  • submitted
    11-04-2024 22:00

General

  • Target

    2ec25567b0ef151a14fc54e709b89676e08497e26de5dcec22a47891282ab71e.apk

  • Size

    837KB

  • MD5

    9653c90e59887e2809ce1e0ae312114b

  • SHA1

    8f4085d421edce76b445aaf37cd3a66a118d3735

  • SHA256

    2ec25567b0ef151a14fc54e709b89676e08497e26de5dcec22a47891282ab71e

  • SHA512

    a50bee86fedb392b2f7af1d0394d770a89cf7faf372612866f2fd7605feb28f84cdcc5d2af05e490b20b6e9f886dccbec0c4bdc5b7d434ed1a5193ad485e40b8

  • SSDEEP

    12288:NgDa1a8LzeHqe40khBi1RxVH65WmpYshXZPbGwidNpgs:CDa1ameKe5kQPVH65WmD9idNpz

Malware Config

Signatures

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

Processes

  • cmf0.c3b5bm90zq.patch
    1⤵
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
    • Makes use of the framework's foreground persistence service
    PID:5090

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads