Analysis
-
max time kernel
8s -
max time network
151s -
platform
android_x64 -
resource
android-x64-20240506-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240506-enlocale:en-usos:android-10-x64system -
submitted
09-05-2024 22:02
Behavioral task
behavioral1
Sample
e76318d5848be1d7876e6cb0afc7afdd10a984e15fc365c006bb87d07b86c825.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral2
Sample
e76318d5848be1d7876e6cb0afc7afdd10a984e15fc365c006bb87d07b86c825.apk
Resource
android-x64-20240506-en
Behavioral task
behavioral3
Sample
e76318d5848be1d7876e6cb0afc7afdd10a984e15fc365c006bb87d07b86c825.apk
Resource
android-x64-arm64-20240506-en
Behavioral task
behavioral4
Sample
i.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral5
Sample
i.apk
Resource
android-x64-20240506-en
Behavioral task
behavioral6
Sample
i.apk
Resource
android-x64-arm64-20240506-en
General
-
Target
e76318d5848be1d7876e6cb0afc7afdd10a984e15fc365c006bb87d07b86c825.apk
-
Size
4.7MB
-
MD5
27bb9dab192bc85db9c5e91718fc72b9
-
SHA1
9fdef59b1ba67d8493d7e9619bd44b7fa8856490
-
SHA256
e76318d5848be1d7876e6cb0afc7afdd10a984e15fc365c006bb87d07b86c825
-
SHA512
dd72639178c917945a097ceebc91698c1854c296be4b1434051d9a2101f1504fd281d9805b1c1b7adbbec913f2876d56e02e2cb3efbbdfeee80e59f1fcd0bb6e
-
SSDEEP
98304:tthZaF/p3HN10BSvjfcgtzgMV/iYgLv3prM/iv07vpHnyC+Q1oUyb3QBQ:zfaP3HISrUpPxC/h44oUogy
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 api.ipify.org -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.honorability.lickodescription ioc process Framework API call javax.crypto.Cipher.doFinal com.honorability.licko