Analysis
-
max time kernel
74s -
max time network
134s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
27-06-2024 22:05
Static task
static1
Behavioral task
behavioral1
Sample
fee1691a6dcd366edac9878b9b1cbb6353ecce39eb5a97605f09ebbd8a005c8a.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
fee1691a6dcd366edac9878b9b1cbb6353ecce39eb5a97605f09ebbd8a005c8a.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
fee1691a6dcd366edac9878b9b1cbb6353ecce39eb5a97605f09ebbd8a005c8a.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
fee1691a6dcd366edac9878b9b1cbb6353ecce39eb5a97605f09ebbd8a005c8a.apk
-
Size
2.1MB
-
MD5
5d9d74a7020021083710595a8082920f
-
SHA1
538a1f88ad1e099c4b4824c1f3e517502d39514d
-
SHA256
fee1691a6dcd366edac9878b9b1cbb6353ecce39eb5a97605f09ebbd8a005c8a
-
SHA512
401aaa33b82aa978e1ef1bdaf33e6ed72f5a036e508bdd68a75ed26c1316c5e69546d47f06654d0d01f58e717991ef7f404efde427be96586ef88b21dabf934c
-
SSDEEP
49152:IFq00C3GNA34Nbh/4ezw4/q88QhmXdFMT1at3H65pFYtvp:Y0JNA34NPw4y8nB1gEUp
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.govkrportalmai.kr/app_ui.App/newobfs/0.pobfs 4425 com.govkrportalmai.kr /data/user/0/com.govkrportalmai.kr/app_ui.App/newobfs/0.pobfs 4425 com.govkrportalmai.kr /data/user/0/com.govkrportalmai.kr/app_ui.App/newobfs/1.pobfs 4425 com.govkrportalmai.kr /data/user/0/com.govkrportalmai.kr/app_ui.App/newobfs/1.pobfs 4425 com.govkrportalmai.kr -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Reads the contacts stored on the device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://com.android.contacts/contacts com.govkrportalmai.kr -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.govkrportalmai.kr -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.govkrportalmai.kr -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.govkrportalmai.kr -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.govkrportalmai.kr -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.govkrportalmai.kr
Processes
-
com.govkrportalmai.kr1⤵
- Loads dropped Dex/Jar
- Reads the contacts stored on the device.
- Acquires the wake lock
- Queries information about active data network
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Schedules tasks to execute at a specified time
PID:4425
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.8MB
MD57836185dc8f50d2ae39579357670b7c7
SHA1b4376ebd25ea7c0809abe721d40211cab97de42e
SHA25682977663278b0daa56cd178e87b7ab2e3621b8147aa6743f79c35891893fc9d1
SHA51274e9ba302e1497911bcbf55c62527f441f9c3a51dfd2b098faeb8adc9f039744c401404b48fb7ce6c5ad526075ea2a7722aae17230fc1c468d2b1bf3d586706d
-
Filesize
382KB
MD506bce5cb2abeb69d44848841b12b3be0
SHA1563363c3f987e9f2ee8dab58ddc33f1be93e802f
SHA256aea6ffef21ee597a275d2a88051a9d22f25655475b4e98dd62d31f6574f9f742
SHA5121bb8992c59a727fdcd4f7bf7782f50b634fdb6c31687cb10414d60c97f4f1f1ca90d9d5cd3ffec149a43628c5678bb97455e7dc69e8995937d33f0872920604d
-
Filesize
92B
MD52957afdecb5926ac707b0a3f80dd4f39
SHA1ce7c618cfada9a071803a2bcb90e3adda0e12e3c
SHA25689954fd301f257e5e4639ebe7b40e5932def1627cc1e0788e0042903900aba91
SHA512def0720594717e19769ae3e939036b7ca79a8ee227193b7cf2ff886bad5d01ebe5523533d678097ac569a7b9418cf89e01c876176d4bfe0700a07049bce22b93
-
Filesize
90B
MD5a78e48a137f39ef5a01cf091eb2aa2f7
SHA1840a65203facb2b539d803b857b1a59d8c1c7937
SHA256eb8889e4f023d20b0dbbd53396b4eaddc07c693c3ddb050170962d14bc96fba9
SHA5125ec4612dbf21c20fdce6e152dedd7f23e97d2013cc5db7444f965104b6d90ed4326ef4b879e64d7a7e0f2e14f38e4f41e0be5e3e5d7618692e09e55125c4dab4