Analysis
-
max time kernel
16s -
max time network
141s -
platform
android_x64 -
resource
android-x64-arm64-20240221-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240221-enlocale:en-usos:android-11-x64system -
submitted
25-04-2024 22:02
Behavioral task
behavioral1
Sample
16ec950e7f8c4645f89017ffd6f94e76217e0a955068e722732f087af4a4407d.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
16ec950e7f8c4645f89017ffd6f94e76217e0a955068e722732f087af4a4407d.apk
Resource
android-x64-20240221-en
General
-
Target
16ec950e7f8c4645f89017ffd6f94e76217e0a955068e722732f087af4a4407d.apk
-
Size
981KB
-
MD5
b2dfd4a7da0459826cd0f2c2ad1d7dcf
-
SHA1
cdf4757a3e97c21695f0f3b13c796dfd113300ab
-
SHA256
16ec950e7f8c4645f89017ffd6f94e76217e0a955068e722732f087af4a4407d
-
SHA512
4851728a58d1ab5890a7ed3104422496936c671ee1ac68cc8eb080cc0018801df04be8ce31f7ea855850d938f117669e913b2ff103a47fe1da6e40bedcbb830c
-
SSDEEP
12288:dmPseYqwV07kHRz9bJvxVzbCgZl4YlyoGotq8mwOAkASw4op3dS+jclYgA4qDHkX:8G0UHJPaylJsGtqbPTozS64Yg/ukgG
Malware Config
Signatures
-
pid Process 4602 com.mafalacobiga.yarala -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.mafalacobiga.yarala