Analysis
-
max time kernel
855s -
max time network
1805s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
13/09/2024, 06:45
Static task
static1
Behavioral task
behavioral1
Sample
TentacleLocker2.apk
Resource
android-x86-arm-20240624-en
General
-
Target
TentacleLocker2.apk
-
Size
48.2MB
-
MD5
d3b4aefa9de69678470eab2e58f7d866
-
SHA1
12f3b345a31b10e1029c406971198ca500c0f8d3
-
SHA256
38191a2880cea788707cd818b62d3eb5afea0e6342f66fc480fdea4bff2d8e75
-
SHA512
e3e3395ec8b8c38213eb2c6bfa136337792c89e74245c8eaf4c8c9b3a5d5eb528405b920f820ad50125eb9b2546795f7a1226c97cd5bac9e8e08ad092bee6238
-
SSDEEP
1572864:+jVSHSiyxuZpR7Byw/yux+Z/zsfDcIzTIT+9M:+jVSyiyxkDz+Z/zUA2ET+e
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 1 IoCs
ioc Process /system/app/Superuser.apk com.HotPinkandAnnue.TentacleLocker2 -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.HotPinkandAnnue.TentacleLocker2 -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.HotPinkandAnnue.TentacleLocker2 -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.HotPinkandAnnue.TentacleLocker2
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
/storage/emulated/0/Android/data/com.HotPinkandAnnue.TentacleLocker2/files/Unity/local.e23619eb2388341988c4de7e5e5e7845/Analytics/ArchivedEvents/172620998400000.8e25d01f/c
Filesize1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
/storage/emulated/0/Android/data/com.HotPinkandAnnue.TentacleLocker2/files/Unity/local.e23619eb2388341988c4de7e5e5e7845/Analytics/ArchivedEvents/172620998400000.8e25d01f/e
Filesize556B
MD587167dbb0bb0fda41c08d3fec8801a6d
SHA1c4ed8f103c254cc5bcb3a961f22b5aedf7c8f220
SHA256879c503bff2ac7ed4b88afb8b57257ce859dd4127b8ec94972f53c843e0e3137
SHA512fad1c75947b258a8df3134e3ac4489fa14ea410d0636917aa39e5bae2f50b918cb93ec72d52c9bfec6e29527fa37c34f0cca2452a22fe5773baaca6811b06c4c
-
/storage/emulated/0/Android/data/com.HotPinkandAnnue.TentacleLocker2/files/Unity/local.e23619eb2388341988c4de7e5e5e7845/Analytics/ArchivedEvents/172620998400000.8e25d01f/g
Filesize1B
MD5c81e728d9d4c2f636f067f89cc14862c
SHA1da4b9237bacccdf19c0760cab7aec4a8359010b0
SHA256d4735e3a265e16eee03f59718b9b5d03019c07d8b6c51f90da3a666eec13ab35
SHA51240b244112641dd78dd4f93b6c9190dd46e0099194d5a44257b7efad6ef9ff4683da1eda0244448cb343aa688f5d3efd7314dafe580ac0bcbf115aeca9e8dc114
-
/storage/emulated/0/Android/data/com.HotPinkandAnnue.TentacleLocker2/files/Unity/local.e23619eb2388341988c4de7e5e5e7845/Analytics/ArchivedEvents/172620998400000.8e25d01f/s
Filesize434B
MD5438fbee27dbb8fc2740a57793befaad8
SHA1a1e2159b6faca9d250aa8e2159f0a96c491150ae
SHA2569da948dbb009f30cb9df34f17594e21a6ac33e81077bcd420cd633d4d28b95fa
SHA5123eea18ffb59618b226bcbb9b029cc44f1de91b9ed4e8bd6c762127f3fb97ccd3753f80620cc1382e5dbadf63a263dc8a2321074f072d79e49c76bf492eb7cbc9
-
/storage/emulated/0/Android/data/com.HotPinkandAnnue.TentacleLocker2/files/Unity/local.e23619eb2388341988c4de7e5e5e7845/Analytics/ArchivedEvents/172620998400001.8e25d01f/e
Filesize580B
MD576243db07822b8e9f7511d23fb51f3f4
SHA11503cfea899f1bbc26135e637992310ad2b650f2
SHA25621f21e3b66dcddeecd2cb7c07ed74bf369f48664837753ef517a5a3569ae5858
SHA512b1f81cdfea95d1ca7a2e0e8a0fbe972e83334c7b258863a31bfd711bfe3d953c475aa85ec8d361575e83cbd694c96ad0a1fb5726395a1f7cd4cabc390d96d7fc
-
/storage/emulated/0/Android/data/com.HotPinkandAnnue.TentacleLocker2/files/Unity/local.e23619eb2388341988c4de7e5e5e7845/Analytics/ArchivedEvents/172620998400002.8e25d01f/e
Filesize1KB
MD59657d155c987ce36dfcc24cca4b283d7
SHA1de045dc0b3390b1513b76494710f6e2b567256a8
SHA256621a8b69c25deab77fc5ef9122d4996036f97d36e12c46bfd7b339578ef3ed8e
SHA51274a24c74171d0ccef5ef5a7f3f68683206a21230bb72dc7797cc1530534d772e3a09aab6881f0c0f73918b61ff5bb55a45dd06bc184d0dad3818113b9876315b
-
/storage/emulated/0/Android/data/com.HotPinkandAnnue.TentacleLocker2/files/Unity/local.e23619eb2388341988c4de7e5e5e7845/Analytics/ArchivedEvents/172620998400002.8e25d01f/e
Filesize1KB
MD5d5e4b61cf035f579312782702cd7d6b1
SHA1102ed81d5e7b4b3f7745789464254f8f9a13bdb8
SHA25675cc25a6026a81546eae19232cb976bde1f82391199894ce019db500ce83876d
SHA5126feb252f323050ae6b74f035e0e575975dbfb4c233a37b08227813fb531aa57741dcfb5dbf9c9f7d47713fd0da4e02f0cf6307df1b24bff95c7d0e610bc3df9f
-
/storage/emulated/0/Android/data/com.HotPinkandAnnue.TentacleLocker2/files/Unity/local.e23619eb2388341988c4de7e5e5e7845/Analytics/values
Filesize135B
MD5ed27207e52bf256cc8f9f25a1eeac8d8
SHA17ca173d287c1466ddeeef9bfe84ff68de793e637
SHA256933327869caaf0ce28fc8f048668a83361c45aacfa7f164796804ac4dcfbde6d
SHA5129c7a7bdb6baf258c29f3705d309165c93f726a69aed30214597b168dd0ddf492d0d18274bdeaf2ed56657480f7e39b13c1f88be52ad545c731bf2f9d13565b80