Analysis
-
max time kernel
7s -
max time network
36s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
10-01-2025 22:17
Static task
static1
Behavioral task
behavioral1
Sample
43a0f7488e76e1b454287e1aae1aa49a2bd297f5457279d4172905c6a18a18a1.apk
Resource
android-x86-arm-20240624-en
General
-
Target
43a0f7488e76e1b454287e1aae1aa49a2bd297f5457279d4172905c6a18a18a1.apk
-
Size
5.3MB
-
MD5
65e137500ec5072abe6e964e8007f364
-
SHA1
89e491ea70e30eb7471e63ec32d05ae083aa0feb
-
SHA256
43a0f7488e76e1b454287e1aae1aa49a2bd297f5457279d4172905c6a18a18a1
-
SHA512
c1977b3fab09595a2a7bc14f4da8a51a350ae0947f551557109d6b9126e388d4d999227fc917a8f1ea33cc712a9c9e3ccbd3a5b81dd0be252a65b1741cbc750b
-
SSDEEP
98304:XW3QaAc8U6UyhFKwNPsQS0dlKeBAg6tcSFvCsPC4jur/z10fXgpXIU+X/ayCgL:G3EhJvyQSCKMAJmSFvzOGUoCgL
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.differselffu/app_ded/Zm0H5w2RuzPV3M03ioYGyVXstGpDUfL4.dex 4317 com.differselffu -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.differselffu
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5fbc1de001d68a8fe6b042e7c82f3eed6
SHA145615f326b5938e0a1080744bc831148ead45667
SHA25690c7db3eb4edb58f1340a821c258343eb205e2d52325b5e46a2316f9035149a8
SHA512973871d71feefa1438fbe9211c87dc93bb1203fad4a47adca2f44446f16fec45d6cf88ee0c3659facbc36c43b6af68e5eb272fa1ac8f9922e2dbb4ba1a226042