Analysis

  • max time kernel
    7s
  • max time network
    149s
  • platform
    android_x64
  • resource
    android-x64-20240624-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system
  • submitted
    10-07-2024 12:02

General

  • Target

    stub.apk

  • Size

    32KB

  • MD5

    2e705f24df00d854a7343bc3f7d692fb

  • SHA1

    f352b6e27dd1daf86f3d541707c4cf75d26f81ef

  • SHA256

    7b6388c2574a3b320a7d086ff3464ed816f0ab1b14ce07ecc9e96760ed08e22b

  • SHA512

    f1a19c62aabb8ed08ee0dc7d77f143664f2e163cf895bdbeb27eed47af5cf6b7f66bacc3dbd2d01cf0483459917d6fdff456e4598bb9cd57f117ad2076b2f89f

  • SSDEEP

    768:Kaal8GFhIIakOtx1HAljy4kW0hIHF/bqt8CjfcPnd:ASGZO71FWwgofQd

Score
6/10

Malware Config

Signatures

  • Queries information about active data network 1 TTPs 1 IoCs
  • Requests dangerous framework permissions 4 IoCs

Processes

  • com.topjohnwu.magisk
    1⤵
    • Queries information about active data network
    PID:4993

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.topjohnwu.magisk/code_cache/res.apk

    Filesize

    8KB

    MD5

    0ceca4909997838abf3479eab0fa4191

    SHA1

    eb3d31c96ca0fb5ffa0d792fbb82a0b944a46a93

    SHA256

    815e384c1c9ebd188bceded7c07c7a3f08d3091435bc7f32e5a7ea2cec645941

    SHA512

    340af0342e6666188b49feb809179229641821d3340754797b32baa8707efda07f6e79981be63a7b5be0cc875f6d6aca3c0e6ebb29ed9638b77c0a4d07759e05