Analysis
-
max time kernel
139s -
max time network
144s -
platform
android_x86 -
resource
android-x86-arm-20240506-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240506-enlocale:en-usos:android-9-x86system -
submitted
07/05/2024, 18:23
Behavioral task
behavioral1
Sample
karma.apk
Resource
android-x86-arm-20240506-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
karma.apk
Resource
android-x64-20240506-en
0 signatures
150 seconds
General
-
Target
karma.apk
-
Size
2.2MB
-
MD5
179c8fee6aefefde45f4b574a5087ec1
-
SHA1
6f29cff8df8bd3f1778db96b1098acd90e97eb11
-
SHA256
352389a788f0dba067feba582e329c75c4c811511eb96e4b1e8a45fa27aefb04
-
SHA512
6bf617a6c1cb0705e07fda97f719103c5cb542963009bb14e0df7745e46fe6a7c661f66bdb4ad34798b9ad0673a5b2dc1fcee68c95f3c72f4ccde47739c70a30
-
SSDEEP
49152:AgvYgTQuGaW/d3VVQfDd55E8HJT1tDPhlg+giKl3fjP01Mt:KHuGxdMfDd55E8HJ3DplErcCt
Malware Config
Signatures
-
pid Process 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 4242 com.example.reverseshell2 -
Reads the content of the call log. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://call_log/calls com.example.reverseshell2 -
Checks if the internet connection is available 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.example.reverseshell2 -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.example.reverseshell2