Analysis

  • max time kernel
    179s
  • max time network
    132s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240514-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240514-enlocale:en-usos:android-11-x64system
  • submitted
    23-05-2024 08:00

General

  • Target

    787f5bb1f29f237d67a37277db5ad85a.apk

  • Size

    2.2MB

  • MD5

    787f5bb1f29f237d67a37277db5ad85a

  • SHA1

    35d31e9925a516f7fa871a822299dec4db4a9010

  • SHA256

    aae7b1407b82659679b181f284c2b6c06258d017265b07db5d231da492cf0dc2

  • SHA512

    e51558eb57c098e95daf4bae15fe2884cbe6254b8727c031b430db5d2d1a09a1b610ff2560b06915afb5a27f0fc742a7ecc05e8d4bb0baae49cb3ab9cd4be7e0

  • SSDEEP

    49152:ZI5gWuOkJ7Dn5nII6d7iHpCMCmFU87pRkgLCrThbcDy9wO0:ZI5loFIIoepwkUUkgLCrThbc+2

Score
7/10

Malware Config

Signatures

  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

Processes

  • jzo.qcg.irpqrjuxr.hlptmljsc.uozrhbbduyf.icqy.myajinlktocuw
    1⤵
    • Makes use of the framework's foreground persistence service
    PID:4624

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads