Analysis
-
max time kernel
175s -
max time network
181s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
25-06-2024 01:24
Static task
static1
Behavioral task
behavioral1
Sample
5148ac15283b303357107ab4f4f17caf00d96291154ade7809202f9ab8746d0b.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
5148ac15283b303357107ab4f4f17caf00d96291154ade7809202f9ab8746d0b.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
5148ac15283b303357107ab4f4f17caf00d96291154ade7809202f9ab8746d0b.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
5148ac15283b303357107ab4f4f17caf00d96291154ade7809202f9ab8746d0b.apk
-
Size
8.5MB
-
MD5
4a40410e3ed082aa20d4eaa508ed451d
-
SHA1
ace5a4e3ab9a2d25ce475ef88ddc1d3a27cacb9e
-
SHA256
5148ac15283b303357107ab4f4f17caf00d96291154ade7809202f9ab8746d0b
-
SHA512
3e987d73dc8ae629798263478540dc7d066716df6aa7dba54151147c026a7178c92e3934deb0959d348913fdc8a0e6e70591cebd4eb30a20ffd1d515ff27d409
-
SSDEEP
196608:z/Xt8rpEImj6nR78YHMTJ2+dMwC+dMwU+dMwg+dMws+dMwi:zvApC6R78YY2qMwCqMwUqMwgqMwsqMwi
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 1 IoCs
ioc Process /sbin/su com.velociraptor.raptor -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.velociraptor.raptor -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.velociraptor.raptor -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.velociraptor.raptor -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.velociraptor.raptor -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.velociraptor.raptor
Processes
-
com.velociraptor.raptor1⤵
- Checks if the Android device is rooted.
- Makes use of the framework's foreground persistence service
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:4258
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36B
MD537e8e716e0e2f4a0b05cd9571d95b84d
SHA1f8d068f6931707bddb8cd69f706f2224ad1fea3c
SHA2567080cb592d5149c858b206d3fd0d5e3e7d601f120af00b2616bee928ee1291ca
SHA512e62b850901835fdb73fa6224618422f721dd765861d42f6bc2dd013413e96bd910ac5313afd9b4f63da74beb12a15fac81b5157456c9caa3031862dab84423f6