Analysis

  • max time kernel
    179s
  • max time network
    133s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240611.1-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240611.1-enlocale:en-usos:android-11-x64system
  • submitted
    20-06-2024 20:22

General

  • Target

    CheatStandoff_2.1.apk

  • Size

    5.4MB

  • MD5

    8a7559806542b099f450c9a2d410fd03

  • SHA1

    890e688a213451e021ee3621d2b55fc48c5d7e17

  • SHA256

    1aadc15493f6f4fe54e4a9769ff02384672b548bc605c79cda714d99065e656c

  • SHA512

    8785c64a8f3f0e4066d522ec02c776a7d3af25ac788554ab49d25b10361b9eefb91b3767fb343334ae09f5212f3b90b0c716cd72abaea2e01c4e3eec7dfd9cdb

  • SSDEEP

    98304:IICMbwEBSiz9Jf1h8AgoJgO1RqL3ZBSLqXQXqULcuaOCVPI0Pz63a7//BBq:IobLBSipx38dQ1RqLHW0QaUArg0Pz62a

Malware Config

Signatures

  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • cheatstandoff.apk
    1⤵
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4659

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads