Resubmissions

13-01-2025 18:24

250113-w2dbxasnas 10

20-12-2024 16:28

241220-tym1tszpdl 10

Analysis

  • max time kernel
    8s
  • max time network
    121s
  • platform
    android_x64
  • resource
    android-33-x64-arm64-20240624-en
  • resource tags

    androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system
  • submitted
    13-01-2025 18:24

General

  • Target

    DJP.apk

  • Size

    3.7MB

  • MD5

    8bd1c057de789baea3d0acad35a4d1fd

  • SHA1

    09692ebecc03862c8223a43e0934fc7e1fa6c06f

  • SHA256

    377f07b92d33e0ea9d7cfe3c288e19df2be8555154bdb1141b82a87d068a0cf7

  • SHA512

    6d4c33afd728d8bdd9ec2ca69554efb3c21370b755812a27b4e5c24aae2e39577b5f0b4aa273ce9dab09b9421bd50c528cf25c6f438726211c757cd09396b738

  • SSDEEP

    98304:p1y8VfJ2nSi+s+OZm41gFvWMfz/L2ci5eR:Hy8Vx2ndLIWQT2cweR

Score
7/10

Malware Config

Signatures

  • Checks known Qemu pipes. 1 TTPs 2 IoCs

    Checks for known pipes used by the Android emulator to communicate with the host.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Reads information about phone network operator. 1 TTPs

Processes

  • com.example.mysoul
    1⤵
    • Checks known Qemu pipes.
    • Queries information about running processes on the device
    PID:4369

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.example.mysoul/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012