Analysis
-
max time kernel
4s -
max time network
149s -
platform
android_x86 -
resource
android-x86-arm-20240611.1-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system -
submitted
13/06/2024, 10:15
Static task
static1
1 signatures
General
-
Target
Last Warrior_Ultimate Fight_1.0.1_apkcombo.com.apk
-
Size
505.2MB
-
MD5
da29ecda88566194a8f2b2e9da362e0f
-
SHA1
a30b36fdef69c919c8aac98ac4dbb982bba96698
-
SHA256
ce8dd3a6ee00b5d6292bbf213053a63d206d18c162783ddfa6b2a10f66927c9f
-
SHA512
df3387d35e4038abcbec489fb3452a0f7685bf043861eea5e54fcbebcb45478288fe908cb3aa448de5edb547e0f00f83e8afa5e8410889dfa588e8906f7cef2e
-
SSDEEP
12582912:HZyEAVGmD/Uhy9pSEP5syaiQ8WNxpDRkrxgEXJI:5OBDdFUiDWN7DOA
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener jkds.haike.jiame