Analysis
-
max time kernel
329s -
max time network
337s -
platform
android_x64 -
resource
android-x64-arm64-20240611.1-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240611.1-enlocale:en-usos:android-11-x64system -
submitted
19/06/2024, 15:33
Behavioral task
behavioral1
Sample
karma.apk
Resource
android-x86-arm-20240611.1-en
1 signatures
300 seconds
Behavioral task
behavioral2
Sample
karma.apk
Resource
android-x64-20240611.1-en
3 signatures
300 seconds
General
-
Target
karma.apk
-
Size
2.2MB
-
MD5
b25999e97aca96d786e1bb547fcade55
-
SHA1
39d020d2042706548609f39d52e9145b9ccec797
-
SHA256
df7e2d4b1dfd637f1c32d686e663e99ee6b3eca9d4c5529f3a4a8ed1a2b92d9f
-
SHA512
e2d7cabb8b24d3327052f78084a3f3999580385b2050a732e14f63e925ff0908a1b3db061506f32455029fdd51c77319ad3994c2002ad18b4b5bab6651ad885a
-
SSDEEP
49152:0gvY8CnRp3VR0GrpOL5rn/8GCyi4VplUT/0UiCYPZ7Dw3NoFg9XFs/Ten:G8CnRp8tL5T/8GfiwpllUiCYZ703emuc
Malware Config
Signatures
-
pid Process 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 4470 com.example.reverseshell2 -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.example.reverseshell2 -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.example.reverseshell2