Analysis
-
max time kernel
8s -
max time network
129s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
15-07-2024 22:05
Behavioral task
behavioral1
Sample
d98ca95aa3d9fa64abbf271087db89145d2fc24010000c8e48374bfd04942b8c.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
d98ca95aa3d9fa64abbf271087db89145d2fc24010000c8e48374bfd04942b8c.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
d98ca95aa3d9fa64abbf271087db89145d2fc24010000c8e48374bfd04942b8c.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
up.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral5
Sample
up.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral6
Sample
up.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
d98ca95aa3d9fa64abbf271087db89145d2fc24010000c8e48374bfd04942b8c.apk
-
Size
4.5MB
-
MD5
1ffaad683dfb2827e47f00a5d4bf3091
-
SHA1
529f917e524040cf2addc9cb5c45694d0c3296ba
-
SHA256
d98ca95aa3d9fa64abbf271087db89145d2fc24010000c8e48374bfd04942b8c
-
SHA512
c061e976560fab9071cc2e255d8d3724c4700dd13860249f07f5808974d1f3a1fb421f2cbe46c419dc4d90b04bd6de1304faa5afbad3f2b10762ad66df0dfa56
-
SSDEEP
98304:T05cTW9eh3x4s/M5MCIqNV10+ug5P8oibdriaaOqgOLbXJ/pTiZFga:ccTW9ehuIIHIcC+p1ibYLaA/Ji7ga
Malware Config
Signatures
-
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.reroller.autoboat