Analysis
-
max time kernel
7s -
max time network
131s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
09-07-2024 22:02
Behavioral task
behavioral1
Sample
2a2f7c941ba799e9c46577f0b4d3d2e1db286a83379bf46f2a2a1002f9bf56ef.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
2a2f7c941ba799e9c46577f0b4d3d2e1db286a83379bf46f2a2a1002f9bf56ef.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
2a2f7c941ba799e9c46577f0b4d3d2e1db286a83379bf46f2a2a1002f9bf56ef.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
up.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral5
Sample
up.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral6
Sample
up.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
2a2f7c941ba799e9c46577f0b4d3d2e1db286a83379bf46f2a2a1002f9bf56ef.apk
-
Size
4.6MB
-
MD5
57f0dcd590e74503458ee38c80438ce0
-
SHA1
2d79e02d35c8897cdf3c3e59a8802462424fccda
-
SHA256
2a2f7c941ba799e9c46577f0b4d3d2e1db286a83379bf46f2a2a1002f9bf56ef
-
SHA512
7635be76db64f33466f7d2b3ba41968e4bf205e82548cf0e401f47023c2c702143b765f510607e3767223de97113dbe2d27370a15e24e0f64bdb2102cfb7191e
-
SSDEEP
98304:bgvytJGPNSgxNoKDofPWMqzD6DrjnSy9LNREL4e83uLTEk:bgvytqNSANoMonWMqzDmbdL9k
Malware Config
Signatures
-
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.sarcocarcinoma.slenderstalkeddescription ioc process Framework API call javax.crypto.Cipher.doFinal com.sarcocarcinoma.slenderstalked