Analysis

  • max time kernel
    3s
  • max time network
    135s
  • platform
    android_x64
  • resource
    android-x64-20240624-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system
  • submitted
    27-06-2024 00:45

General

  • Target

    edlir.apk

  • Size

    2.0MB

  • MD5

    a540a523d5787c237772f202bba09905

  • SHA1

    11af54feebe5a0ab0c7ed07217f01b1f6df0e17e

  • SHA256

    ba52d0bd1826ecaf674d68130b209e86e4297a831b181e95a9da16a4ff838772

  • SHA512

    46848f88069df672766dfbeadda0a5a4d507b14a2dccc0cf8afe253efc97b8ff5e0353d1a59c021220bd7cc580c7c6eb5ab3d04761f8a6c611c9ca507dfdf023

  • SSDEEP

    49152:6tsdkkgeXF9463Zuwa/hS7GDVHFmaXoU51+2FCUVaNDDib/:9kk5XjH3La/xDP5Xl51/wUENDW

Score
6/10

Malware Config

Signatures

  • Acquires the wake lock 1 IoCs
  • Queries information about active data network 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs

Processes

  • com.temptation.lydia
    1⤵
    • Acquires the wake lock
    • Queries information about active data network
    PID:4945

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.temptation.lydia/files/PersistedInstallation8768725901317346992tmp

    Filesize

    90B

    MD5

    0580c73931d7c335bbb378e566768382

    SHA1

    408bc3e735f8ccd67a1a6f6ceaae0c8bead15cd3

    SHA256

    ad190e3d6410aa65e7067e78eafe721025f541f04554053b1a7f1c0ef2712830

    SHA512

    5dca7b9c9e0da84d7fc8a604c622da97e745dde36f2dbc718ffb986ab1772964829f4b5c711af25f3ccee91a27448d6cbcd332dd01d002c54a8f9d069c6b0ba1