Analysis
-
max time kernel
9s -
max time network
131s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
16-07-2024 22:01
Behavioral task
behavioral1
Sample
c66b09e3021050f080e06c9aad6358a351b5a371328b131e8c7b08a555786c80.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
c66b09e3021050f080e06c9aad6358a351b5a371328b131e8c7b08a555786c80.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
c66b09e3021050f080e06c9aad6358a351b5a371328b131e8c7b08a555786c80.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
up.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral5
Sample
up.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral6
Sample
up.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
c66b09e3021050f080e06c9aad6358a351b5a371328b131e8c7b08a555786c80.apk
-
Size
4.4MB
-
MD5
afc4b2c7772ab99dc168b8b1881e119b
-
SHA1
4484b5149b3c40780d718e7c7a778ce2d243fea2
-
SHA256
c66b09e3021050f080e06c9aad6358a351b5a371328b131e8c7b08a555786c80
-
SHA512
54e6f5d29a1c21095db5fd0c1b5f75209de70bfc9e4805cf26a09b41c7aa99cd7334ba61f1893385b8e6cc27e74ec76a108140f05f8d8c0abb2a9850d05f6761
-
SSDEEP
98304:YB9ANsYfV+T3oxe0piCldK3SFnTnSvMEcauNUnif2QjWlj9Egz:YB92sYfGhAHGYIFBuN+j9Egz
Malware Config
Signatures
-
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.jumentous.cameliasdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.jumentous.camelias