Analysis

  • max time kernel
    2s
  • max time network
    141s
  • platform
    android_x86
  • resource
    android-x86-arm-20240514-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system
  • submitted
    22-05-2024 15:37

General

  • Target

    alipay_plugin.apk

  • Size

    354KB

  • MD5

    7b3353b143078dbafd37485f8136728e

  • SHA1

    f2d312754bb2c4854849381997561d09a90b4fb9

  • SHA256

    e86f24838e0aa5527adf3d129652bf70b67990989bf7e8c8d61c3356231ce1ac

  • SHA512

    0f326957abeebaed130da1f6ec7a53de5dd9671d6ae7d975f2b6172af4c323df81efd0f6d4b8a1e4197d5dd35d4419c658f1c936a404bbf9d7e73ee71a5e06f8

  • SSDEEP

    6144:Iv8DL7okgHi/BBs3dWcfihtB7+Y3Ju4g2Tf5C8EcPK+WvyQcy2fny43:Iv67gC/BBsNWfh3VcG5CLE8Rcy2fny43

Malware Config

Signatures

  • Requests cell location 2 TTPs 1 IoCs

    Uses Android APIs to to get current cell location.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Checks if the internet connection is available 1 TTPs 1 IoCs

Processes

  • com.alipay.android.app
    1⤵
    • Requests cell location
    • Queries information about the current Wi-Fi connection
    • Checks if the internet connection is available
    PID:4271

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads