Analysis

  • max time kernel
    3s
  • max time network
    132s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    17-08-2024 14:36

General

  • Target

    yoma_964F37_gxj.apk

  • Size

    79.6MB

  • MD5

    9d039d31d18db86fca2e3fd632cc5d62

  • SHA1

    0aa27cf0720afd4e88be74c33032d1ed8e177e94

  • SHA256

    a60e98c34702f6d524d41e4cd9e65654757ff2c11f66a4ab43d351796c9b73f6

  • SHA512

    d0820d41b0f93fe0990dba28857753b2a3102f1aa7548abe70c4ee1930f0e3524873a1f522cb41e43d476d0b6824841b1c8f1bdec8808775eb5d2ae9980e944b

  • SSDEEP

    1572864:zgXyusQ9uJ0xXuuKUSEMmDK99hghH1LPyb:0IjJCXuuKFXmDK93gx1LPa

Score
7/10

Malware Config

Signatures

  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.asdream.app
    1⤵
    • Loads dropped Dex/Jar
    PID:4482

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /system_ext/framework/androidx.window.sidecar.jar

    Filesize

    12KB

    MD5

    bdf3529e80318eb14e53a5bf3720c10d

    SHA1

    25c9ace4b1af6e80ebb2572345972c56505969ba

    SHA256

    bbc8300dd1e9cd08de8f66560c1ac2c928615b72b51cef9649f88974f586d64b

    SHA512

    48b9c2d01171bb651b9b54826baa51f4add48431a3efd8ceb5f7cc3bcd6f8f37edf47fabb24349dd15b3a02329cd450f90a8d164bf4f8dfae554bf3b35a8a55b