Analysis
-
max time kernel
8s -
max time network
132s -
platform
android_x64 -
resource
android-x64-arm64-20240514-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240514-enlocale:en-usos:android-11-x64system -
submitted
19-05-2024 22:02
Behavioral task
behavioral1
Sample
bc381d12a5c8ca86d373772da6bfa58eafa5e30bb23bd952b31e26d4822618c1.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
bc381d12a5c8ca86d373772da6bfa58eafa5e30bb23bd952b31e26d4822618c1.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
bc381d12a5c8ca86d373772da6bfa58eafa5e30bb23bd952b31e26d4822618c1.apk
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral4
Sample
i.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral5
Sample
i.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral6
Sample
i.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
bc381d12a5c8ca86d373772da6bfa58eafa5e30bb23bd952b31e26d4822618c1.apk
-
Size
4.6MB
-
MD5
c4a3c4d3bb04f8675750fca3fdf40c64
-
SHA1
7c0e4390ae1e0ba84170aa904004685e79642f18
-
SHA256
bc381d12a5c8ca86d373772da6bfa58eafa5e30bb23bd952b31e26d4822618c1
-
SHA512
14856b76160d0a6b9487bd0330fb07fefab1df0d18b406e0c9d8d608769479e7aa03e687cabcfba33ff2a5c8658826503de9e2e7316689c4f9416e938abf9501
-
SSDEEP
98304:AhdkVsiMloo5itCn6RSCnx81UUEaX1fROLbphc4s:AD2silkn6RLx8vVpOLUr
Malware Config
Signatures
-
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.strangely.taperfashiondescription ioc process Framework API call javax.crypto.Cipher.doFinal com.strangely.taperfashion