Analysis
-
max time kernel
7s -
max time network
119s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
13-01-2025 18:19
Behavioral task
behavioral1
Sample
f5050a664ed6db7c4ef18bcb52d32e65aaacde3e65899f09df39c45c7bcd88b1.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral2
Sample
f5050a664ed6db7c4ef18bcb52d32e65aaacde3e65899f09df39c45c7bcd88b1.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral3
Sample
f5050a664ed6db7c4ef18bcb52d32e65aaacde3e65899f09df39c45c7bcd88b1.apk
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
f5050a664ed6db7c4ef18bcb52d32e65aaacde3e65899f09df39c45c7bcd88b1.apk
Resource
android-x86-arm-20240624-en
General
-
Target
f5050a664ed6db7c4ef18bcb52d32e65aaacde3e65899f09df39c45c7bcd88b1.apk
-
Size
3.6MB
-
MD5
b71eea4c65cf81d71a7a437ee480e345
-
SHA1
888b1e2f1aae6388ca7a2d47a79ad1f4fe07fc2a
-
SHA256
f5050a664ed6db7c4ef18bcb52d32e65aaacde3e65899f09df39c45c7bcd88b1
-
SHA512
b93dcb9db1b3ba81717ea997d4316abc4160bba3ac62038a84c3f36d5f290b2eeb0c14d33c6566dfd25c7cbfb48fbf8d2e7c7075008dd3333cea02acfefa2c45
-
SSDEEP
98304:ic1y8VpuDWck8pZHfVv2aucRDNgLPFRQXcYyl:Ny8VpuCckOvhBePFRrYyl
Malware Config
Signatures
-
Checks known Qemu pipes. 1 TTPs 2 IoCs
Checks for known pipes used by the Android emulator to communicate with the host.
ioc Process /dev/socket/qemud com.example.mysoul /dev/qemu_pipe com.example.mysoul -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.example.mysoul -
Reads information about phone network operator. 1 TTPs
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD591e25c34b27f9b8f3605f0690bf504ca
SHA1dc6fcdea583253da4cde9e406bf9149dcc886836
SHA256d2766742c2ddb940490e3faa864c1492c9b81ec0af0b9e2dc58ae21fed7367bb
SHA5120b767c3a68a03d27d94df7f264c225b40a503d53ccdecf7346741cd27dc3a1121f83ea402fb28d892b72f25051a85bee0fae994f58047817be4bf04670dddca6
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5a13ea3abf14d309af43f7c23036ddb11
SHA1c3e6c39a06414543afd8dc839111aa7154c6f4b9
SHA256b23780af677ef28ac5616f5ddf936fe47325bb91558efc14835439ead58710b9
SHA51240621b260beef0c85915bb80ac9ea05468f6507680d36f6783c6304cc0c236974695057586a5231523f7eae5ee0f8d8e2c78d5c663308ed86ddee195bf1ead98
-
Filesize
108KB
MD57650b7a2743339b070050438b15e15cd
SHA117af476169d09a19730f6ff6bd33ca459d04cf70
SHA2566d1e8a63f44d9416aa40acbbb12dca063f88adedcfc4ca638b8788022c1f2b2d
SHA5123dee5c12fb15b2f3b1b0185c039cca0fcaf2032ff802bd26f8a3542270402489cd46a1ad6f7e759c00340fdc56ef7c1a8455443f4a3b5a0eca5780f767a0ee64