Analysis
-
max time kernel
48s -
max time network
149s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
22-05-2024 11:59
Static task
static1
Behavioral task
behavioral1
Sample
debug.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
debug.apk
Resource
android-33-x64-arm64-20240514-en
General
-
Target
debug.apk
-
Size
7.1MB
-
MD5
6ccf20450978cddc36a6dc6cc8bfc14f
-
SHA1
b74826afd024352ce5b62d3592ac98a51bcc4918
-
SHA256
e732a71958619e8b845410c137146b574f17b9eaaabfb1f3171037ef8f2dd8ac
-
SHA512
08522dce68198f08e6fce9c20ad75ee4b14bbdfcd0c1e2729f0d4809dbb9ed2e7dd90a0bfa8352cd7295fec3dee515cfd85a582c10116eee1166df382b3feeb7
-
SSDEEP
98304:MDJwLKoTwru9x8TdcGTY+YdokswkRjGyd9Gv/VqJPjNuFBGsAIQ/6bkbVa:2J6x8TenbshhrdO/oJPRAGsA6CVa
Malware Config
Signatures
-
Checks Android system properties for emulator presence. 1 TTPs 1 IoCs
Processes:
com.applaunch.mixodescription ioc process Accessed system property key: ro.hardware com.applaunch.mixo -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
-
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
-
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.applaunch.mixoioc pid process Anonymous-DexFile@0xe626e000-0xe6270d00 4258 com.applaunch.mixo Anonymous-DexFile@0xe619f000-0xe61a1020 4258 com.applaunch.mixo Anonymous-DexFile@0xe6175000-0xe6177ea4 4258 com.applaunch.mixo Anonymous-DexFile@0xc9783000-0xc9788ba8 4258 com.applaunch.mixo -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.applaunch.mixodescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.applaunch.mixo -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.applaunch.mixodescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.applaunch.mixo -
Reads information about phone network operator. 1 TTPs
-
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
Processes:
com.applaunch.mixodescription ioc process Framework API call android.hardware.SensorManager.registerListener com.applaunch.mixo -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.applaunch.mixodescription ioc process Framework API call javax.crypto.Cipher.doFinal com.applaunch.mixo
Processes
-
com.applaunch.mixo1⤵
- Checks Android system properties for emulator presence.
- Checks CPU information
- Checks memory information
- Loads dropped Dex/Jar
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Listens for changes in the sensor environment (might be used to detect emulation)
- Uses Crypto APIs (Might try to encrypt user data)
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.applaunch.mixo/files/AFRequestCache/1716380922790Filesize
3KB
MD50df2cf106d1a8e1789096a79ef4b1515
SHA1c5601ac82e7622fb20c66de093f501e353e3e3c2
SHA256b30f7ff0ef0bab8e6d8b8a928a34441ebe01c1f4d74325bbc4547b39a5e08d54
SHA512d44669e157db4d005ab0bde05bda7d4ecc7c1fd20ef43836a46e746b9822823adf2e2f7fe1b47340efebdc75c3af405caa0d4bb8feda73451367884652879bae
-
/data/data/com.applaunch.mixo/files/profileInstalledFilesize
24B
MD55a867cfc0e7aa1ab3ca5f411ddd0ac26
SHA1e29b51d333eb7699228f1702a342a26a053e1fbe
SHA256e658c51c1527bd9dec867ba6dbec755243b53755205667622bc60494cda54881
SHA512bd7eab6e2d116b7ee2c2b0d4d340f17ca822781b345d37f1a3df0d877bfad4804c1ef1ec148a47f7877cad745aaa6dd8fe16a8e2083fbc430fa3ea8dbba4177f
-
Anonymous-DexFile@0xc9783000-0xc9788ba8Filesize
22KB
MD5ef1a7adb109b0ad4da578f51e3efc1ae
SHA139672e1c975ff4ae759b869d0410b90fe1ef7b4a
SHA2563ecedeb07b6b3a7d1bd235b387ce65894d83042a1c1bb641cba0a19c1a1f7146
SHA512936257fe696b8434f5d9cc0aad30736d07f97d14c6b1ff968ca3ba405574a0018d813a3126ce25635c255e8717d0abee485cd6ec974722082fdadc6689acf138
-
Anonymous-DexFile@0xe6175000-0xe6177ea4Filesize
11KB
MD50bba2eda283057834590001bf869edb7
SHA1e82dc44a92e9607e112a845d8c458afbac7dc6c1
SHA256090eea545887cf6b28c51f795bfef902cdc03cd3f4c02695761086d9fd51d4f2
SHA512cdc0d9a03f4f5bdad02b46bb40f8663cfa6bed0a2a7065422837b4f5439dcb8987eec03df76f104ca06b1cf61988b8ce9965997d9d454aed3bd2c8630eac5bc7
-
Anonymous-DexFile@0xe619f000-0xe61a1020Filesize
8KB
MD5ac209a0b4dd8c3908ca8e0ec2e5c77d4
SHA1beb86f3c2637666dc238aa2dcfeb78169cbebf62
SHA256f7f2390997b68beea68efa62e75a8c38d2c125b8d2c1a4c25ed00ea5d1e203fa
SHA512d8339e188423223f49f2b4b4521f9e014ecf2f9a17242a6394625ca43686fb86bd4978c0ba79b704137155ec4a89b08e302ac6ed1cf14f8d8bfb0adaaae29c13
-
Anonymous-DexFile@0xe626e000-0xe6270d00Filesize
11KB
MD5c4d6d35e8dc357f7b63b6eed2d76df9e
SHA182d1922fd10346d3001d2575dbd89c8836bdb931
SHA2562d286b7081c586db4c2eeeabd8284d7dfec04ec3ff3dd8b15b75dd320dd9f452
SHA512f5e4c28860cc8722f62da3883746a92e65348f9a338c8ad9a3a20212ab5e74485b3c049cc74da6fc085292e478fc18fdb970e6e0a6aa0b181db3521383b047e6