Analysis
-
max time kernel
7s -
max time network
184s -
platform
android_x64 -
resource
android-x64-arm64-20240514-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240514-enlocale:en-usos:android-11-x64system -
submitted
21-05-2024 06:00
Behavioral task
behavioral1
Sample
malshell.apk
Resource
android-x86-arm-20240514-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
malshell.apk
Resource
android-x64-20240514-en
2 signatures
150 seconds
Behavioral task
behavioral3
Sample
malshell.apk
Resource
android-x64-arm64-20240514-en
2 signatures
150 seconds
General
-
Target
malshell.apk
-
Size
9KB
-
MD5
7bbc40b0d1726e9e2cae183921352ab8
-
SHA1
09691739a52e0959baff5f93e175b43c6d3c3e66
-
SHA256
d17c86b2b2a47182cf2dceac24047c360c74a014c30489863ce950192efb59e7
-
SHA512
aa917f330c3f39c2b598ed5d4c470e5901437b44a191606691cedf87583518554fe03a46cae79e368b25d494faa7a740ded5107f2a01fec4562fe5fc4701d460
-
SSDEEP
192:ELt7+5Ne5TuzWerjlIG5INeeJxlF3K2d43rbfpYoaqRXlVP+Z8:ELtdiWedj5IN3JnBK2dKrbRYohRq8
Score
6/10
Malware Config
Signatures
-
Acquires the wake lock 1 IoCs
Processes:
com.metasploit.stagedescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.metasploit.stage -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs