Analysis

  • max time kernel
    12s
  • max time network
    147s
  • platform
    android_x64
  • resource
    android-x64-20240221-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system
  • submitted
    25-04-2024 22:02

General

  • Target

    16ec950e7f8c4645f89017ffd6f94e76217e0a955068e722732f087af4a4407d.apk

  • Size

    981KB

  • MD5

    b2dfd4a7da0459826cd0f2c2ad1d7dcf

  • SHA1

    cdf4757a3e97c21695f0f3b13c796dfd113300ab

  • SHA256

    16ec950e7f8c4645f89017ffd6f94e76217e0a955068e722732f087af4a4407d

  • SHA512

    4851728a58d1ab5890a7ed3104422496936c671ee1ac68cc8eb080cc0018801df04be8ce31f7ea855850d938f117669e913b2ff103a47fe1da6e40bedcbb830c

  • SSDEEP

    12288:dmPseYqwV07kHRz9bJvxVzbCgZl4YlyoGotq8mwOAkASw4op3dS+jclYgA4qDHkX:8G0UHJPaylJsGtqbPTozS64Yg/ukgG

Malware Config

Signatures

  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Acquires the wake lock 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.mafalacobiga.yarala
    1⤵
    • Makes use of the framework's foreground persistence service
    • Acquires the wake lock
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:5091

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads