Analysis
-
max time kernel
4s -
max time network
1814s -
platform
android_x64 -
resource
android-x64-arm64-20240624-fr -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-frlocale:fr-fros:android-11-x64system -
submitted
21-09-2024 21:37
Static task
static1
Behavioral task
behavioral1
Sample
com.snapchat.android-13.9.0.29.apk
Resource
android-x64-arm64-20240624-fr
General
-
Target
com.snapchat.android-13.9.0.29.apk
-
Size
148.5MB
-
MD5
0195a2272d8adc9bfd21572d09985f3e
-
SHA1
909288bcdad8d8eacb59a1346f2dbb16c7c89423
-
SHA256
8748b0868e0c87c1349e63a4d469ccd4ed2c48acbce0b0ca8e1a90f830663a18
-
SHA512
06213732cd493eec1778a285555dc7645a60b7822948b05bef35ce85c69ab96f12edfdbbf677df5690de013a8eb03038406e05f29353d2bc88394108432708f0
-
SSDEEP
3145728:bZvWulezwOdcKY+4JJuWiNcG2Kpgj2SR7MyhpXQ:bZuuleFdzK1igMgj2h
Malware Config
Signatures
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.snapchat.android
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5c2cb6588cff28170f789a47c9f899463
SHA16bc5162bc2b56e3a2e283893d14ab3325695693c
SHA2569e4ce09686a7050b362a06dcc04ec84bc644c3f6cdce07d3e24ae3259f877774
SHA512300eecd13019e28ff7dc6e3fb25d46795a706b42db2865deac0e08ce8f5b2c9630c14714e6cb65ec05aab49687e918dabcbc52d705a05864d308bf64c10d1b1c
-
Filesize
2KB
MD5eb9f7423870c8afbde9220a28ac9eb32
SHA1d1e9370dbbb7f0e6c1edaad00996c4c82e6a166a
SHA25656d27e55a5e43617d228b2d65eeb72481907e91ce268863ae3897004b5846918
SHA51216a91db211d345dfad86e7b28fbe58705798f95f263dfd5d920bbfd130ac754a66d6e45da7084346cdf6018614e549c171a7bceafa26a677b68456d6df5a4624