Analysis Overview
score
10/10
SHA256
8ec195cd1f5c9f66c75000f26120832d7e1a9044fe3699d18d676bd5739b8518
Threat Level: Known bad
The file 2_5444877474481575337.apk was found to be: Known bad.
Malicious Activity Summary
SLocker payload
Slocker family
Registers a broadcast receiver at runtime (usually for listening for system events)
Requests dangerous framework permissions
MITRE ATT&CK Matrix
N/A
Analysis: static1
Detonation Overview
Reported
2024-05-13 18:36
Signatures
SLocker payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Slocker family
Requests dangerous framework permissions
| Description | Indicator | Process | Target |
| Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. | android.permission.SYSTEM_ALERT_WINDOW | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-13 18:36
Reported
2024-05-13 18:39
Platform
android-x86-arm-20240506-en
Max time kernel
64s
Max time network
130s
Command Line
com.lololo
Signatures
Registers a broadcast receiver at runtime (usually for listening for system events)
| Description | Indicator | Process | Target |
| Framework service call | android.app.IActivityManager.registerReceiver | N/A | N/A |
Processes
com.lololo
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| US | 1.1.1.1:53 | semanticlocation-pa.googleapis.com | udp |
| GB | 142.250.200.14:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 142.250.187.206:443 | android.apis.google.com | tcp |
| US | 1.1.1.1:53 | www.google.com | udp |
| GB | 142.250.200.36:443 | www.google.com | udp |
| GB | 142.250.200.36:443 | www.google.com | tcp |
Files
N/A