Analysis

  • max time kernel
    6s
  • max time network
    186s
  • platform
    android_x64
  • resource
    android-x64-20240624-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system
  • submitted
    10/08/2024, 23:02

General

  • Target

    f8dff889e9fcda807ee8330d4a0f1bb18d196bd2c9bdc0f45cbe329783af006d.apk

  • Size

    1.5MB

  • MD5

    07b4b63bd30ca74d9f5f807dd19f2ff9

  • SHA1

    7267bef37c36ac983c7c007aa724d53f2c8e4ba1

  • SHA256

    f8dff889e9fcda807ee8330d4a0f1bb18d196bd2c9bdc0f45cbe329783af006d

  • SHA512

    e93e59596c014b495219d988f5f8c05489ba020bc2096fd4a4fce1d03c89cc38eb8ad6dab13d4c4b960edaa8a7f24d35f74bd58f42371280ca20c42ab8ec83c9

  • SSDEEP

    24576:hppIlLhOzXHwilJDWB5iGJnZs1odhGdhkE1pI10hWgFe4AHdAOe0ORks2:hpmOzXHwiTyLGjTW0DFe4mdATe

Score
7/10

Malware Config

Signatures

  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.adroidzscpc.penetratezb
    1⤵
    • Loads dropped Dex/Jar
    PID:4979

Network

        MITRE ATT&CK Mobile v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • /data/data/com.adroidzscpc.penetratezb/code_cache/i11111i111.zip

          Filesize

          187KB

          MD5

          0bcbab8c42c9018c497ae2049bee6f44

          SHA1

          b27def83324b1efa9765bb7241465bcd7d8eba97

          SHA256

          b5d1fefbc49841b7c4d6884a6cf066805de0680f22832f3a99be1dde7614d754

          SHA512

          89d3efbd445f37e41f4b397ff1db5848009bdabeaac79d898cf4cd59486ed623e94f47fc9d02b9847c7447a164d9b559b299cfaac52bd48205883142dd4132ef

        • /data/data/com.adroidzscpc.penetratezb/dpt-libs/x86_64/libdpt.so

          Filesize

          543KB

          MD5

          14a36e2eea3edcb7a7b9f00668c86dde

          SHA1

          25b0cf4f6423d29402a533517fc6b1277f10d7b1

          SHA256

          8f87c1fdcdadeafa04c11bc390675c2e293cddf8df09971854f637e19651070a

          SHA512

          695ebeb763361f19e1f6a561d88dd3b23e1c8284513e4a01e83a4876f92365c9653039595319f493450c2d75e04e9ff75ba5eeaab50c55363958b1ed279ef8d2

        • /data/user/0/com.adroidzscpc.penetratezb/code_cache/i11111i111.zip

          Filesize

          721KB

          MD5

          a76c33bbd6554ab74454a0cd8af670bc

          SHA1

          c57952952cc17f16db24755b9d9070ef33d262a2

          SHA256

          be7daf9a1eb51abdfe39084bde14f2e0c41e0d522688da8afe154ad44d4086d6

          SHA512

          cc8cf5a032c39af5e3f2e569bf95b94f7a55e37be08e6c91144cd3698886f0af282a5abc0e5aac4eaa804394bf31e4b151aacbb4e800903b9093f261679d1f39

        • /data/user/0/com.adroidzscpc.penetratezb/code_cache/i11111i111.zip!classes2.dex

          Filesize

          3KB

          MD5

          c15804d75ad84c1de89596a48950be14

          SHA1

          571ed1b9dfc541b2b3929bfa5727b408cae2bb8e

          SHA256

          07072b1c20c4cf6785cba0ea43158365c46dc027e5fb0d43a27826fa1206e5e4

          SHA512

          0612cc8aa98385477592de07c9c8cb5ad602d423a469c0c9cfc6341ff46aa2d4e84be5217bc087fc82f15dbdd2ccce1d72e37e3ff88a9405f4da21538e39e689