Analysis
-
max time kernel
147s -
max time network
156s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
15-02-2025 22:01
Behavioral task
behavioral1
Sample
6d8d0402b5b190c321bccedc7f910518d6c87f852c081b97cf6e24443550cdb2.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
6d8d0402b5b190c321bccedc7f910518d6c87f852c081b97cf6e24443550cdb2.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
6d8d0402b5b190c321bccedc7f910518d6c87f852c081b97cf6e24443550cdb2.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
6d8d0402b5b190c321bccedc7f910518d6c87f852c081b97cf6e24443550cdb2.apk
-
Size
777KB
-
MD5
89c0019307257f65e39a7950d2cdc99d
-
SHA1
d9f1b153be6b5723db46b08b4df4f72185699367
-
SHA256
6d8d0402b5b190c321bccedc7f910518d6c87f852c081b97cf6e24443550cdb2
-
SHA512
5a7a9826d6656970c9a9b820a825ac9da275ed57334f1e57280388a012ce279a99cb2be09abf53b77446ad9ec113ec44b9c5b2035c9ed1c503369ed09e64effa
-
SSDEEP
12288:H3YGxWJa1a8Lzeo56ZSQaSi5WmpYshXZPbGwidNpgHE6:XVWJa1ameo8ZSDSi5WmD9idNpwD
Malware Config
Signatures
-
pid Process 5204 cmf0.c3b5bm90zq.patch -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground cmf0.c3b5bm90zq.patch -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver cmf0.c3b5bm90zq.patch