Analysis

  • max time kernel
    12s
  • max time network
    72s
  • platform
    android_x64
  • resource
    android-x64-20240221-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system
  • submitted
    27-04-2024 04:12

General

  • Target

    client.apk

  • Size

    807KB

  • MD5

    c91b968b11bb2ac894739c48d7ca9aad

  • SHA1

    7e5ade3831be1a3eb03bcc8d0abdb407118379b2

  • SHA256

    ea9d481ce2c87fb6190d69533cddac9704800842a33465aab1186419440b2f15

  • SHA512

    97e25b68a205a80cd1fb31a32ecc872e6c475a60f4b81c36b37eb2a5c57dcfbc9023f40bba442e531ce7deb3afe4ade4998baba1aec0e981aa2beb5892dc0e9c

  • SSDEEP

    12288:OGPRulAkACIrK7Z0C9HDrdvhj3KGLaD26C9XgqRCIlNE8Z6GvhZT:rQp7IrKuC9HdvhjKeaDnG5Zv

Score
7/10

Malware Config

Signatures

  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

Processes

  • yps.eton.application
    1⤵
    • Makes use of the framework's foreground persistence service
    PID:5038

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads