Analysis
-
max time kernel
6s -
max time network
152s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
05-09-2024 22:01
Behavioral task
behavioral1
Sample
4793b7d02cd520c5cb3289d989cff3cb218dc78fa48619c168f6a8f8fdbc5972.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
4793b7d02cd520c5cb3289d989cff3cb218dc78fa48619c168f6a8f8fdbc5972.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
4793b7d02cd520c5cb3289d989cff3cb218dc78fa48619c168f6a8f8fdbc5972.apk
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral4
Sample
up.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral5
Sample
up.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral6
Sample
up.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
4793b7d02cd520c5cb3289d989cff3cb218dc78fa48619c168f6a8f8fdbc5972.apk
-
Size
4.6MB
-
MD5
29f8ab525b75cf601c9ec5cf6899deb4
-
SHA1
e9cb9ff08c568427400e6fa88b8f55a2783a21de
-
SHA256
4793b7d02cd520c5cb3289d989cff3cb218dc78fa48619c168f6a8f8fdbc5972
-
SHA512
e250e3e94019e43d9c1e5cd3fc6de0c56cdf32df92915cc7e08c1fabe059139aa4b76a29fda6f631ad41e3174c66c710ac7fe32869be169f1363e273b19112c1
-
SSDEEP
98304:a9adIljqoYWfKDBVijib92k1ZHNajQY3ZJ3:a4dWq/RDBViib9zZHN4BpJ3
Malware Config
Signatures
-
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.chairwomen.callaodescription ioc process Framework API call javax.crypto.Cipher.doFinal com.chairwomen.callao