Analysis
-
max time kernel
135s -
max time network
309s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
07/11/2024, 07:07
Static task
static1
3 signatures
Behavioral task
behavioral1
Sample
wavvzucu22.apk
Resource
android-x64-20240624-en
1 signatures
600 seconds
Behavioral task
behavioral2
Sample
wavvzucu29.apk
Resource
android-x64-20240910-en
0 signatures
600 seconds
General
-
Target
wavvzucu22.apk
-
Size
5.1MB
-
MD5
0adfa947acd3880f6d6e05c85350b388
-
SHA1
a2077a02ea901af075f42ba327ad350f07f8dca5
-
SHA256
fb61250d64af13947366d86122dfa4fa9600cb5b7f4bb900a081cccfbfb487ec
-
SHA512
c650bb9021042412f6811476edf022a8c92705c2a9f336b366901960c6273c3718e7d68f78fc1c38c68cfd1f2ef45ae64fcf5f19e75ccd44f4ed18a9304c09db
-
SSDEEP
98304:F/sQQpYSly9aNaHV9EdJ+cpITRo6tJ4Ob34L5HEs4altMvN422A:F/hc09y+cVSr34L5khalWS22A
Score
7/10
Malware Config
Signatures
-
Queries information about running processes on the device 1 TTPs 2 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses gqcvctl.msthh.swxgkyv Framework service call android.app.IActivityManager.getRunningAppProcesses gqcvctl.msthh.swxgkyv:remote