Analysis

  • max time kernel
    3s
  • max time network
    131s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240221-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240221-enlocale:en-usos:android-11-x64system
  • submitted
    17-04-2024 22:05

General

  • Target

    253f00caeaf96575b5e47073fc00ab0ebedc6517810f1bdeccbed8be259fa9c0.apk

  • Size

    4.8MB

  • MD5

    1843d271218e35a1cdb790b96493fee0

  • SHA1

    27d9bbc6705bd7cd133da1f8dee1a246f946e0c0

  • SHA256

    253f00caeaf96575b5e47073fc00ab0ebedc6517810f1bdeccbed8be259fa9c0

  • SHA512

    efd0328f4b7a031609a4a1e4d278a5636f9242e91bdc250acc1f7af171823dcdba3d8def89d1287111add727ff5355aa8be41f963cfa594f3185aede96dd604f

  • SSDEEP

    98304:TRtPQU6SV5TtA7xVx8Fpjc7h1KEpX7kkuIDvC1:TRBQUxax8pjQm2LaEvw

Score
6/10

Malware Config

Signatures

  • Acquires the wake lock 1 IoCs
  • Reads information about phone network operator. 1 TTPs

Processes

  • com.temptation.lydia
    1⤵
    • Acquires the wake lock
    PID:4585

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.temptation.lydia/files/PersistedInstallation2510640441620850566tmp

    Filesize

    90B

    MD5

    d12bd4ea01079ccb6f1446c1222f2e2d

    SHA1

    ffc606915cbfc0e4849a2ef561e9caa4b13d5ff3

    SHA256

    d66d4688103fa30f8cebad4b52407c00465c94f421e2c98bbc5b250ed1606788

    SHA512

    a1488ec1adb9b40c9f0a00278433e56dda55ec13cd3270ef52414ef9a1f533a460bac88eeac9747a09eb265eda185e3f271ae37501abe30d235437c998670f95