Analysis

  • max time kernel
    122s
  • max time network
    152s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    05-09-2024 22:01

General

  • Target

    i.apk

  • Size

    3.9MB

  • MD5

    7e8e0db955d619a73de43aaa4b2778d5

  • SHA1

    bf9e7b16a7454d8a3bd00b8e1a6b3c3ff0656ef3

  • SHA256

    94b5798ccd1e5d329bfd944e3e599cf4d7580c017f2a9612148b28a45d844f92

  • SHA512

    c275a5ff91dee6d0bf3d8cec787b13e690e48c302f57ff67c7f6382bc00270e4ee9c42c7fd8f0f07fba44aec5d4d93f63f99d301d9b135249d0084e91235143d

  • SSDEEP

    98304:9Jw6ORAxTmZkopsxtCUH/kifmtY4otbjqr2zpAuCyDV:zwXMT2pshH/kifKyJjy2AKDV

Malware Config

Signatures

  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.supergoodness.ferrol
    1⤵
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4762

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads