Analysis
-
max time kernel
153s -
max time network
159s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
23-05-2024 11:50
Static task
static1
Behavioral task
behavioral1
Sample
cjzf_mba_fwpt_mobile.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
cjzf_mba_fwpt_mobile.apk
Resource
android-33-x64-arm64-20240514-en
General
-
Target
cjzf_mba_fwpt_mobile.apk
-
Size
3.8MB
-
MD5
5c8548a25e6e58fc76489b0ccebd3b04
-
SHA1
5f580e2c5249c35c8642485600bb4ea434a7dab8
-
SHA256
9eaebf67c308aa2ff1f661ff765d1116aca6a31684eb868e9326282bc59c2f0d
-
SHA512
624337a4e351413496606ba09aad3b23855b1a798c17bc2868ffbaa372763241a456e7e6d1667d6dac104f68bd75022d0964f258a60fdbb22399221c0f03c363
-
SSDEEP
98304:30oiyvSIl+dBlyvSIl+3yvSIl+feNtDkUwYzlpncoF:EXyvS6wyvS6yyvS6uerppcoF
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
io.dcloud.H53D14D02description ioc process File opened for read /proc/cpuinfo io.dcloud.H53D14D02 -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
io.dcloud.H53D14D02description ioc process File opened for read /proc/meminfo io.dcloud.H53D14D02 -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
io.dcloud.H53D14D02description ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo io.dcloud.H53D14D02 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
io.dcloud.H53D14D02description ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone io.dcloud.H53D14D02 -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
io.dcloud.H53D14D02description ioc process Framework service call android.app.IActivityManager.registerReceiver io.dcloud.H53D14D02 -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
io.dcloud.H53D14D02description ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo io.dcloud.H53D14D02 -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Reads information about phone network operator. 1 TTPs
-
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
io.dcloud.H53D14D02description ioc process Framework API call javax.crypto.Cipher.doFinal io.dcloud.H53D14D02
Processes
-
io.dcloud.H53D14D021⤵
- Checks CPU information
- Checks memory information
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
- Uses Crypto APIs (Might try to encrypt user data)
PID:4320
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/io.dcloud.H53D14D02/files/cnc3ejE6/eje3cncFilesize
335B
MD5585839d66722cfd02e40cb740cccb633
SHA1374c19200fee201b26d0153487a281a934615884
SHA25686a9bb4985cca6c9636c4fd071bef4b70ba7b3a5eb51af869a1299dc2b1574a8
SHA51209bbe1bf1455861fd4732f2d1945c84bac34090906ac2fab75d144c22ffcf6bc585c8209e94a2b1919c8402df53966081a1af2993e12261ae4c4ac5568667d88
-
/data/data/io.dcloud.H53D14D02/shared_prefs_ext/test_appFilesize
24B
MD5e099fcc7a180bc37945aa5141227127d
SHA12a640911cd5033e72f28277abbb3c491a5fafa8e
SHA25688a6c119afefc90a93d988bc5653b52f4f0b18ba0632f2a550388c8a698dd8d6
SHA512999b1259172d350e79a6bcc6308691a29305b03b75278ffb0153ddff27e000cefcbfcb855c3091820f2849901c910dfb87b7504e24bbaa18c4b23fa83e8461b3
-
/storage/emulated/0/.imei.txtFilesize
32B
MD589cab4aea3d67af6e07b20ace9898633
SHA1d6cfc67eab1bbb5d5592992ca3c571a32ad4c75b
SHA2569c9b63ab185dc57a42caa8f4716a0d8eb89d79e3c77739d9171725bf3046dc00
SHA5129ab4d606ba8e5db92889444989907e54c416d72ccff5233f2f29586851b0150602508b8007e325a3693a7d6bd1eefff2f8a329e066a8670bc15b7bb35991db1e