Analysis
-
max time kernel
306s -
max time network
614s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
14/09/2024, 17:23
Behavioral task
behavioral1
Sample
system.apk
Resource
android-33-x64-arm64-20240624-en
2 signatures
1800 seconds
General
-
Target
system.apk
-
Size
2.2MB
-
MD5
0b8fa481a40dea489c019ffe85c3dd7e
-
SHA1
24c9eb572d3fcc8727ef3d0bb4a58bbccba702b8
-
SHA256
7eb00f9351a7a2caeefdaa172288c2ae77922407c88f4f517884a600d3ea812f
-
SHA512
e18d8ba908765ed2e15528d563c5902c9544d9336ec4a6cfe13174c42b15c46f437e9f0718a7af786374079ded2444b0fff5aa4d941972911fe654674b96d41b
-
SSDEEP
49152:kgeFnfKo5c6ZXSbArvhlywS4zF64kC1apeR7kvgvYfsr:kg2n35hSMv3yN4zF6nC1/kT0r
Score
6/10
Malware Config
Signatures
-
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.example.reverseshell2 -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.example.reverseshell2