Analysis
-
max time kernel
59s -
max time network
60s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
05/03/2025, 12:48
Behavioral task
behavioral1
Sample
chicken gun 3D stingray.apk
Resource
android-x86-arm-20240910-en
3 signatures
60 seconds
Behavioral task
behavioral2
Sample
chicken gun 3D stingray.apk
Resource
android-x64-20240910-en
2 signatures
60 seconds
Behavioral task
behavioral3
Sample
chicken gun 3D stingray.apk
Resource
android-x64-arm64-20240910-en
2 signatures
60 seconds
General
-
Target
chicken gun 3D stingray.apk
-
Size
553KB
-
MD5
7be22b5d5a292b64f70a89a101455fc5
-
SHA1
7358abbb18dca549920af35d6e08ff5119b21a36
-
SHA256
fe06abeb153a0c1f5d44c6921f1350c6a57a3d0bd52cf2ab6364063b2090d0fa
-
SHA512
01dac188ffd6bfb87dc04f85dfda4bf37f67848e15f994a7b19c6f19b53716602d66cedacbfaf634a04d4e10dc6fde31b0adb5bda2e8034e54c251da4170de3a
-
SSDEEP
12288:UjRH6+O//n3tKpSsM+1HA+Ctv95cVS3EVqPlR6i0Ci3jM34D9z:UN6+ONjstgPtv7OS3EW6i0C+M3Sz
Score
7/10
Malware Config
Signatures
-
Reads the contacts stored on the device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://com.android.contacts/data/phones com.elite -
Tries to add a device administrator. 2 TTPs 1 IoCs
description ioc Process Intent action android.app.action.ADD_DEVICE_ADMIN com.elite