Analysis
-
max time kernel
47s -
max time network
130s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
21-05-2024 05:25
Static task
static1
Behavioral task
behavioral1
Sample
upgrade.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
upgrade.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
upgrade.apk
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral4
Sample
childapp.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral5
Sample
childapp.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral6
Sample
childapp.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
upgrade.apk
-
Size
8.6MB
-
MD5
879341f5413a5c3b7c2ae9cb1dcfd63a
-
SHA1
09115e34bb0bfe8d649237993f995c5161363c54
-
SHA256
3cff417e481167c5065842c64f44b070538d993381d8cee8313ad1fd211e8999
-
SHA512
05ac12cdc81561107a90029eb83a6fbf249ea67beb4c8a282b71046c0438a37e6dfe34d0e95d49e738eb63812631af0a833c6ddecf489eaf407eab749b2c75c9
-
SSDEEP
196608:/J1eEIs5uMib8n0QKpVHlEmshxNJgYpnnrEjc02:B0Ed5MHmmsZu4nnwI02
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.appd.instll.load/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.appd.instll.load/app_ded/kQ9qiKvhqbaZvEga52oZSwe8453ZV0wn.dex --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.appd.instll.load/app_ded/oat/x86/kQ9qiKvhqbaZvEga52oZSwe8453ZV0wn.odex --compiler-filter=quicken --class-loader-context=&ioc pid process /data/user/0/com.appd.instll.load/app_ded/kQ9qiKvhqbaZvEga52oZSwe8453ZV0wn.dex 4284 com.appd.instll.load /data/user/0/com.appd.instll.load/app_ded/kQ9qiKvhqbaZvEga52oZSwe8453ZV0wn.dex 4310 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.appd.instll.load/app_ded/kQ9qiKvhqbaZvEga52oZSwe8453ZV0wn.dex --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.appd.instll.load/app_ded/oat/x86/kQ9qiKvhqbaZvEga52oZSwe8453ZV0wn.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.appd.instll.load/app_ded/kQ9qiKvhqbaZvEga52oZSwe8453ZV0wn.dex 4284 com.appd.instll.load -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.appd.instll.loaddescription ioc process Framework API call javax.crypto.Cipher.doFinal com.appd.instll.load
Processes
-
com.appd.instll.load1⤵
- Loads dropped Dex/Jar
- Uses Crypto APIs (Might try to encrypt user data)
PID:4284 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.appd.instll.load/app_ded/kQ9qiKvhqbaZvEga52oZSwe8453ZV0wn.dex --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.appd.instll.load/app_ded/oat/x86/kQ9qiKvhqbaZvEga52oZSwe8453ZV0wn.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4310
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.appd.instll.load/app_ded/kQ9qiKvhqbaZvEga52oZSwe8453ZV0wn.dexFilesize
4.6MB
MD5e65bef9966515139314174ea44f7ac8f
SHA1ffc3a9107e89b927a32a87c5ae04c0baecbe89f7
SHA256fa08514b31f976b2459aacfadf6ee390a1cdbf542c3c0d706e0469a134eb7188
SHA512c96f857500e3194335a8e9a89bd91de97415d4f483293f5b972b158f759d53562f6934fb9032045fad6bde82e2525a5fc39c7a4b6006e622b3de16f494a5c0ea
-
/data/user/0/com.appd.instll.load/app_ded/kQ9qiKvhqbaZvEga52oZSwe8453ZV0wn.dexFilesize
4.6MB
MD5b0ca0bcd8e45b0e4aab6c2eb31bd81a5
SHA1691c9f488be4257d20bbb7d04eb7f59fac564ba5
SHA256ae2cca68e06e89bbeb3125e9f6acbb50b2ba09d97019455cc865555dfadca762
SHA5129a1173a3355341b674778a090d804ae2ff564c1fcd57a3de522bd137f9612c7e21178c0047c637060a2caaf46807c9dd82042d3c5920dee4c142a438c490906e