Analysis

  • max time kernel
    147s
  • max time network
    158s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    06/10/2024, 22:09

General

  • Target

    15252dab0ea1545375e816146a323e001c0f1284ebe404ccf24cc58721707adc.apk

  • Size

    760KB

  • MD5

    230986f6152a3b0a898bca6869847d98

  • SHA1

    0922174d3244baf0181e905e1c22216f86415ec0

  • SHA256

    15252dab0ea1545375e816146a323e001c0f1284ebe404ccf24cc58721707adc

  • SHA512

    3228f3ca94e2addb1242c616ce3d7c6276df184744a446be32051f26b98c234b80c899b3bd32d05d1055934135bdfb84a24e96e11f89d22e1eb41c9e8c385368

  • SSDEEP

    12288:tPV6sa1a8Ldej9X0x27AKY5WmpYshXZPbGwidNpgt:tPfa1a6ejix8AKY5WmD9idNpK

Malware Config

Signatures

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

Processes

  • cmf0.c3b5bm90zq.patch
    1⤵
    • Makes use of the framework's foreground persistence service
    PID:4646

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads