Analysis

  • max time kernel
    8s
  • max time network
    131s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    17-08-2024 22:04

General

  • Target

    d87755796b0e83f1dbd140aeb93817f791cc9302edd3301b813c4a24d36f4a3f.apk

  • Size

    4.8MB

  • MD5

    8fc7d230d7817178d75d44f56bac871a

  • SHA1

    f427ed0fee5d8209b7aa12a4f17c7a368a07d634

  • SHA256

    d87755796b0e83f1dbd140aeb93817f791cc9302edd3301b813c4a24d36f4a3f

  • SHA512

    bc69fd21daa0d21db5abb25b6fc1bffb0bfcc3779f6de756444f6d22f50f12dfc6da09a66b4b8c66e4c8016e53939617cc93e0f1bfdbd994962ca68887d1afba

  • SSDEEP

    98304:LDrtZS2wUB9dwIMZA3XRKWym7fA4JZNiU6CjqfoADaNHg9KI4z:LHtILoHHYA3XRnpJWCjutaHSw

Score
6/10

Malware Config

Signatures

  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

Processes

  • com.atm.card
    1⤵
    • Makes use of the framework's foreground persistence service
    PID:4252

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads