Analysis

  • max time kernel
    3s
  • max time network
    140s
  • platform
    android_x86
  • resource
    android-x86-arm-20240221-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240221-enlocale:en-usos:android-9-x86system
  • submitted
    27-04-2024 22:27

General

  • Target

    alipay_plugin_20120428msp.apk

  • Size

    354KB

  • MD5

    89c04e1ebcd58eca6dd93211628ed0bc

  • SHA1

    7d1e77ce25a635299704dbd95bd95c697572ea9d

  • SHA256

    ee3c608fff51b313f4e0b3e542bedccb4d4db4c8eb44e63bf4be0d468e9ee117

  • SHA512

    3dccaeff9906401855f3071c91012926d7e9250674ea0bb89606e4862223a8343fc7b9369afe4e50031d261b45437107c018f565da5615c49721c3bf1bf6ed01

  • SSDEEP

    6144:cH8LfOo+BjGVN8TdW4zxgnm1Us3JuOK2vf5C8EcPK+WvyQcQ2fnq7:cHLxBiVN8pWggmlY25CLE8RcQ2fnq7

Score
8/10

Malware Config

Signatures

  • Requests cell location 1 TTPs 1 IoCs

    Uses Android APIs to to get current cell location.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Checks if the internet connection is available 1 TTPs 1 IoCs

Processes

  • com.alipay.android.app
    1⤵
    • Requests cell location
    • Queries information about the current Wi-Fi connection
    • Checks if the internet connection is available
    PID:4242

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads