Resubmissions
07/08/2024, 18:04
240807-wnsjnsvdrb 10Analysis
-
max time kernel
14s -
max time network
65s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
07/08/2024, 18:04
General
-
Target
evil.apk
-
Size
2.2MB
-
MD5
2acbaece60958c4387ae33e58fd3dc6c
-
SHA1
9b027236b6a7bb3559da27caaa5e36f64d1b1928
-
SHA256
d7c358fadad18ff30432f3840f58d471416a1ea4f47ac9f5b1c6e170e8a0e005
-
SHA512
cce43b720951d0a105c44df819074d5669eb366164f582f699e41eb1afa309ab144f025f28cdf671d58f9fb38af6a435f05c1fa2c0f6f0112d108e9aec7a63d3
-
SSDEEP
49152:/gvYb7wVqDTrbHt0RI0FQBoEXw0DMw5B8WR87abKgLvxkiUCvB:DSqDDae0UBA0X8t38dvB
Malware Config
Signatures
-
pid Process 4426 com.example.reverseshell2 4426 com.example.reverseshell2 4426 com.example.reverseshell2 4426 com.example.reverseshell2 4426 com.example.reverseshell2 4426 com.example.reverseshell2 4426 com.example.reverseshell2 4426 com.example.reverseshell2 4426 com.example.reverseshell2 4426 com.example.reverseshell2 4426 com.example.reverseshell2 4426 com.example.reverseshell2 4426 com.example.reverseshell2 4426 com.example.reverseshell2 4426 com.example.reverseshell2 4426 com.example.reverseshell2 4426 com.example.reverseshell2 4426 com.example.reverseshell2 4426 com.example.reverseshell2 4426 com.example.reverseshell2 4426 com.example.reverseshell2 4426 com.example.reverseshell2 4426 com.example.reverseshell2 4426 com.example.reverseshell2 4426 com.example.reverseshell2 4426 com.example.reverseshell2 4426 com.example.reverseshell2 4426 com.example.reverseshell2 4426 com.example.reverseshell2 4426 com.example.reverseshell2 4426 com.example.reverseshell2 4426 com.example.reverseshell2 -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.example.reverseshell2 -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.example.reverseshell2