Analysis

  • max time kernel
    4s
  • max time network
    166s
  • platform
    android_x86
  • resource
    android-x86-arm-20240514-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system
  • submitted
    24-05-2024 04:16

General

  • Target

    alipay.apk

  • Size

    350KB

  • MD5

    b1305a5e4779e06a6c654258b02dfb15

  • SHA1

    f9e387482bc9649fba2aaf04ba6ae02334651223

  • SHA256

    258c17f04df6697fccf9ae1479f35543bd4a4081edda48a1ea2c37bc1b870e6a

  • SHA512

    9a3f94b5d38dfa8f7e6b24c0dde0b940e48a757e8634754f3c37050d826e620dfc1838c783d99e94f97b08dd7474d7b619a22d037d414300c3874476fdc90cfd

  • SSDEEP

    6144:5FeKnPt0/sEGId2fuRmlxLwEd0r2FfS4QlV7G8v9oKvFuQL2bBV2fnayx5:5FeKFFEGc2ymsMa4QlV7G8Ge62fnayv

Malware Config

Signatures

  • Requests cell location 2 TTPs 1 IoCs

    Uses Android APIs to to get current cell location.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Checks if the internet connection is available 1 TTPs 1 IoCs

Processes

  • com.alipay.android.app
    1⤵
    • Requests cell location
    • Queries information about the current Wi-Fi connection
    • Checks if the internet connection is available
    PID:4248

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /storage/emulated/0/alipay/logs/2024-05-24/4-16-49.log
    Filesize

    279B

    MD5

    42530b83564ae1fb9413e28bd85466b5

    SHA1

    1203b2e29cdeafc1c5eace922e0aa5530aefaf7e

    SHA256

    c2200aa8890d3166e00189b8f4ee42a9b0489735fd75cb3a7968a5bbfc2186d4

    SHA512

    0662e61b3e85108087a8d70d382e7702ee9fe401c4d6d2bc5166491d399c40c404de12c3c386b0863be6c9ceb3d2155c45eeabd19decfbc4e47369edc466cf75