Analysis
-
max time kernel
9s -
max time network
150s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
01-05-2024 22:00
Behavioral task
behavioral1
Sample
ae1e8a05bd4584555d67ac61760932536d823e69b9dbd395dc7584cfccc9abef.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
ae1e8a05bd4584555d67ac61760932536d823e69b9dbd395dc7584cfccc9abef.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
ae1e8a05bd4584555d67ac61760932536d823e69b9dbd395dc7584cfccc9abef.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
ae1e8a05bd4584555d67ac61760932536d823e69b9dbd395dc7584cfccc9abef.apk
-
Size
237KB
-
MD5
7f2d655f9236d3f170915992bc1cc67f
-
SHA1
69f13772690bebd0b6d79271c0daaf2ec2aa486d
-
SHA256
ae1e8a05bd4584555d67ac61760932536d823e69b9dbd395dc7584cfccc9abef
-
SHA512
13201c4412c995dc486d203b95b97e5b2cec876c5a8da35c7ad4923d56c96f1c63d60696efee2f27ed226d9db8d3c2713be447b6a9555bd048a74d3f63480d1e
-
SSDEEP
6144:7UPhi3DItIsPsOAhaaGqqeUSto40KWc94lgwDn/EuGz:Qhi38PsOQdGqDUko4vWoFu/nM
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.nameown12description ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.nameown12 -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.nameown12description ioc process Framework service call android.app.IActivityManager.registerReceiver com.nameown12 -
Reads information about phone network operator. 1 TTPs