Analysis

  • max time kernel
    7s
  • max time network
    36s
  • platform
    android_x64
  • resource
    android-33-x64-arm64-20240624-en
  • resource tags

    androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system
  • submitted
    10-01-2025 22:17

General

  • Target

    43a0f7488e76e1b454287e1aae1aa49a2bd297f5457279d4172905c6a18a18a1.apk

  • Size

    5.3MB

  • MD5

    65e137500ec5072abe6e964e8007f364

  • SHA1

    89e491ea70e30eb7471e63ec32d05ae083aa0feb

  • SHA256

    43a0f7488e76e1b454287e1aae1aa49a2bd297f5457279d4172905c6a18a18a1

  • SHA512

    c1977b3fab09595a2a7bc14f4da8a51a350ae0947f551557109d6b9126e388d4d999227fc917a8f1ea33cc712a9c9e3ccbd3a5b81dd0be252a65b1741cbc750b

  • SSDEEP

    98304:XW3QaAc8U6UyhFKwNPsQS0dlKeBAg6tcSFvCsPC4jur/z10fXgpXIU+X/ayCgL:G3EhJvyQSCKMAJmSFvzOGUoCgL

Score
7/10

Malware Config

Signatures

  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.differselffu
    1⤵
    • Loads dropped Dex/Jar
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4317

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.differselffu/app_ded/Zm0H5w2RuzPV3M03ioYGyVXstGpDUfL4.dex

    Filesize

    2.3MB

    MD5

    fbc1de001d68a8fe6b042e7c82f3eed6

    SHA1

    45615f326b5938e0a1080744bc831148ead45667

    SHA256

    90c7db3eb4edb58f1340a821c258343eb205e2d52325b5e46a2316f9035149a8

    SHA512

    973871d71feefa1438fbe9211c87dc93bb1203fad4a47adca2f44446f16fec45d6cf88ee0c3659facbc36c43b6af68e5eb272fa1ac8f9922e2dbb4ba1a226042