Analysis
-
max time kernel
26s -
max time network
36s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
14-01-2025 09:12
General
-
Target
dimond_free.apk
-
Size
789KB
-
MD5
aade91cf3cf4c46f64a02f97e93b0d2d
-
SHA1
1c92d900ebab95c730f7bf8598a46661723e2cc9
-
SHA256
517d243ae971f0bd724466676f2ed7f6397fa647791e5018f82126d7c863c723
-
SHA512
ac164f4457ff22379eab7cb25e013faa95def38b1ba7ca48af6e98b8d44cdff96402b3ae06f21404f8f46b9df63bc3e010df0026cb887a0feb0c491b17792067
-
SSDEEP
24576:WTJkVAo5cmjthrKBOkJCQUsGEqGEbGEhGEtc:WTyGObIJCRLsrVD
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.lololp/cache/natives_sec_blob3420687684943910621.dex 4337 com.lololp -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.lololp
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
407KB
MD5e400b315488068e409c0a67ec54b5cf9
SHA1ebf22b074a669a1f964d0203f27c2ed31f76da7e
SHA256cc0c12987c9bafac45177af0c4cfbf10e9ea1a780d63edb7cfad35e6ffb7dbe6
SHA512365f0c7ef1c819fe16ace7def1a17eeac93aeb0295b74e04adeb6370a9be8187737c9667d97f2ca43bc56a2d9924643bb3740981288f878c97864438d677c634
-
Filesize
8KB
MD5805779ff4b324f2e7bc966226712c511
SHA175ee544449e478d09e7d01ae378a278677e578d8
SHA2569f5f3b22e9fed87358b21071efcd0d60ef36f38c0552e3c5f0a0d602e4f33247
SHA5129ef8f501150982f8db49a7fa20179b2943d45d616b4fd9cc4de5040cd7f5e735c92801510bca5e7c1a258ccaaec754dbabb1c8f59da92f0d7a640b4dfe27833f