Resubmissions
13-01-2025 15:53
250113-tb1cmszmdj 1013-01-2025 15:48
250113-s8783szlen 1013-01-2025 15:45
250113-s683laxmby 10Analysis
-
max time kernel
32s -
max time network
132s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
13-01-2025 15:48
Behavioral task
behavioral1
Sample
085d7e2fafc8b6aad0bd0e8361c5dae7249afa34ebd43d66278af27ace60b238.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
085d7e2fafc8b6aad0bd0e8361c5dae7249afa34ebd43d66278af27ace60b238.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
085d7e2fafc8b6aad0bd0e8361c5dae7249afa34ebd43d66278af27ace60b238.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
085d7e2fafc8b6aad0bd0e8361c5dae7249afa34ebd43d66278af27ace60b238.apk
-
Size
3.5MB
-
MD5
2be0c2b438dbc8dd89c0ed34db466f7d
-
SHA1
c795e972b09cb5a15e7e30ab6d6faad88aafc678
-
SHA256
085d7e2fafc8b6aad0bd0e8361c5dae7249afa34ebd43d66278af27ace60b238
-
SHA512
0cef57fff738ed45833b3d4ea657b71a329b5c8fc1206be680ed33490537621c1654e15cfaf687de20be0d2fb8181630fb12e18ba4e49602f234efe624f6bfce
-
SSDEEP
98304:3Z1IWbE4aPTHP5J2P2R1pozWaLIXf9Y6NJgd2ofrZD1y889wL:3LZFqTHP/2YjozWUIXfO6Puy889wL
Malware Config
Signatures
-
Checks known Qemu pipes. 1 TTPs 2 IoCs
Checks for known pipes used by the Android emulator to communicate with the host.
ioc Process /dev/qemu_pipe com.example.mysoul /dev/socket/qemud com.example.mysoul -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.example.mysoul -
Reads information about phone network operator. 1 TTPs
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD561e200c1477684a4910acb4a24ed7c1b
SHA19a679965fb26dabde601305ea1b3bb2ea2c11602
SHA256d3020a988e4245710527b72afc77631a63197ad9a74bff4d2ead4f3bc4a8b8ce
SHA512a382ba7915ff57a2172a35308ce873d86273276b42dc0da9dfc6d25dbc379edcb0fddc2aa707abff9362de9fb1cf654c6b83944dda6c308773ac355a25914a71
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5ef901babc6dc24007647fbfe4aeaa84d
SHA1879158dc4c45c04c420664bb5e2f103175ced230
SHA2560c0a1ac445323964f1c28907373ecc4fd51ef9876d97fd9cc39af9432e9f3ed6
SHA51256d14598c9d0f83fed716f924db21fd68800fb0077caccb3bfff8e7ba3ba8ef91cdb4569fd4cd483b59dd4b7eb488426acd5543f5693fbfdf9f31686487adb45
-
Filesize
108KB
MD51a9edc74f43805af20f82f5d2d7b5e8f
SHA1720a5c4a6f7cef9693e98092a181ea6eafc05883
SHA256edde7f77a029d9a725fb2083f0139077b4eb5efbd209a7f68249a073869f05d7
SHA51270eed7dd07e4640733cef870548e37b68468644ed861237aad6f95abc61129bed9659aea52484efa0393f0920b0223c8c7b880786749933539a746c4869bcae2