Analysis

  • max time kernel
    2s
  • max time network
    131s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    27-06-2024 00:45

General

  • Target

    edlir.apk

  • Size

    2.0MB

  • MD5

    a540a523d5787c237772f202bba09905

  • SHA1

    11af54feebe5a0ab0c7ed07217f01b1f6df0e17e

  • SHA256

    ba52d0bd1826ecaf674d68130b209e86e4297a831b181e95a9da16a4ff838772

  • SHA512

    46848f88069df672766dfbeadda0a5a4d507b14a2dccc0cf8afe253efc97b8ff5e0353d1a59c021220bd7cc580c7c6eb5ab3d04761f8a6c611c9ca507dfdf023

  • SSDEEP

    49152:6tsdkkgeXF9463Zuwa/hS7GDVHFmaXoU51+2FCUVaNDDib/:9kk5XjH3La/xDP5Xl51/wUENDW

Score
6/10

Malware Config

Signatures

  • Acquires the wake lock 1 IoCs
  • Queries information about active data network 1 TTPs 1 IoCs

Processes

  • com.temptation.lydia
    1⤵
    • Acquires the wake lock
    • Queries information about active data network
    PID:4263

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.temptation.lydia/files/PersistedInstallation9198797829100409988tmp

    Filesize

    90B

    MD5

    ed87e5464351cf4b1740bd0b43347fa1

    SHA1

    76237882e6f5bd2aabe1b01d67c328be05f87292

    SHA256

    f91bdc7c8c391661d8ff1c2390ff2643d3ee28a8183472c3f792bda1ab13765c

    SHA512

    20c8b05c83a99551f37a61e5bd810e73513202efea652d767ddd1218ce6ab3390defa204cff1b662955aead03b4820cdbafeee9096de92adf5f42516de073b4a