Analysis
-
max time kernel
5s -
max time network
131s -
platform
android_x64 -
resource
android-x64-20240514-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240514-enlocale:en-usos:android-10-x64system -
submitted
23-05-2024 22:00
Behavioral task
behavioral1
Sample
c205749c0845e58842eb4f7c851741215bb4ca886b4af6ee6776e48ad8ffd129.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
c205749c0845e58842eb4f7c851741215bb4ca886b4af6ee6776e48ad8ffd129.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
c205749c0845e58842eb4f7c851741215bb4ca886b4af6ee6776e48ad8ffd129.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
c205749c0845e58842eb4f7c851741215bb4ca886b4af6ee6776e48ad8ffd129.apk
-
Size
860KB
-
MD5
4698cf50175befa88bf69de3e9d8fbee
-
SHA1
d56774a07e76102e347ebe18868dca9ce3ca9910
-
SHA256
c205749c0845e58842eb4f7c851741215bb4ca886b4af6ee6776e48ad8ffd129
-
SHA512
feb112a56f0335a5007e45f56bc2484dff884173514d093d7c534d22224d129837be7ae5efa5d016ca22e6fd93d722dde1c92101ce122c05f85c7d5b3a8ae9c6
-
SSDEEP
24576:ALXbSiBU23fon4mEB4eX64vv08xIK7LQhc+cxk:APSi4mX6430GT7ecq
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.indicate.ordinaryioc pid process /data/user/0/com.indicate.ordinary/app_mph_dex/classes.dex 5070 com.indicate.ordinary /data/user/0/com.indicate.ordinary/app_mph_dex/classes.dex 5070 com.indicate.ordinary -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.indicate.ordinarydescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.indicate.ordinary -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.indicate.ordinarydescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.indicate.ordinary
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.indicate.ordinary/app_mph_dex/classes.dexFilesize
929KB
MD57f99011707bc55532dfb82caf0df1b11
SHA10e46b591ca58a647f4bf2a184e38f97f5e13902b
SHA2561857313577c3a52f565f007d3ebf2655b7ad50c9bdf73f77e59b07033c0c52bb
SHA51245bc44c0f402335493de5b1a6739ffb3fc507d5d1bc0bd0d6a94e850c6624432553aeae9dc0e64081d92e3b8e1f693704169836b6af88e0a8f15370aa1f67809