Analysis Overview
score
1/10
SHA256
91312d7b6c3c8f78c73246504ff42c1764f502b98637498a6aca43e15ba58721
Threat Level: No (potentially) malicious behavior was detected
The file 9f83a4bfbc3aa51435203dc3bb8cd7f2.apk was found to be: No (potentially) malicious behavior was detected.
Malicious Activity Summary
N/A
MITRE ATT&CK Matrix
N/A
Analysis: static1
Detonation Overview
Reported
2024-06-13 11:42
Signatures
N/A
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-13 11:42
Reported
2024-06-13 11:46
Platform
android-x86-arm-20240611.1-en
Max time network
149s
Command Line
N/A
Signatures
N/A
Processes
N/A
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| GB | 216.58.204.78:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 142.250.179.238:443 | android.apis.google.com | tcp |
| US | 1.1.1.1:53 | applycards.online | udp |
Files
N/A
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-13 11:42
Reported
2024-06-13 11:46
Platform
android-33-x64-arm64-20240611.1-en
Max time network
170s
Command Line
N/A
Signatures
N/A
Processes
N/A
Network
| Country | Destination | Domain | Proto |
| GB | 172.217.169.36:443 | udp | |
| GB | 172.217.169.36:443 | tcp | |
| GB | 172.217.16.228:443 | tcp | |
| N/A | 224.0.0.251:5353 | udp | |
| GB | 216.58.212.234:443 | udp | |
| US | 162.159.61.3:443 | tcp | |
| US | 162.159.61.3:443 | tcp | |
| GB | 142.250.178.3:443 | tcp | |
| US | 162.159.61.3:443 | udp | |
| GB | 142.250.178.3:443 | udp | |
| GB | 172.217.169.36:443 | udp | |
| GB | 142.250.179.228:443 | tcp |
Files
N/A