Analysis

  • max time kernel
    7s
  • max time network
    151s
  • platform
    android_x64
  • resource
    android-x64-20240624-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system
  • submitted
    11-07-2024 07:39

General

  • Target

    stub.apk

  • Size

    32KB

  • MD5

    2e705f24df00d854a7343bc3f7d692fb

  • SHA1

    f352b6e27dd1daf86f3d541707c4cf75d26f81ef

  • SHA256

    7b6388c2574a3b320a7d086ff3464ed816f0ab1b14ce07ecc9e96760ed08e22b

  • SHA512

    f1a19c62aabb8ed08ee0dc7d77f143664f2e163cf895bdbeb27eed47af5cf6b7f66bacc3dbd2d01cf0483459917d6fdff456e4598bb9cd57f117ad2076b2f89f

  • SSDEEP

    768:Kaal8GFhIIakOtx1HAljy4kW0hIHF/bqt8CjfcPnd:ASGZO71FWwgofQd

Score
6/10

Malware Config

Signatures

  • Queries information about active data network 1 TTPs 1 IoCs
  • Requests dangerous framework permissions 4 IoCs

Processes

  • com.topjohnwu.magisk
    1⤵
    • Queries information about active data network
    PID:4950

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.topjohnwu.magisk/code_cache/res.apk

    Filesize

    8KB

    MD5

    d47dbc6f4e77f8bb484d3e3ce59461c8

    SHA1

    4facd015d0221ac7ac25d7d2aaf565e30e60e17a

    SHA256

    81b06985e61293fd12ba8d0d9bc68cd3b93ee74c0c4566f13cae693891dc8492

    SHA512

    ec3087fd18a66e78726af1c39a4139af9fa5065830002cd0ef382a6e1a309aa09f32b955e5f8bf1d83cf9c96296ce2671e7165595d9a98a4b9f647a14e17ed0a