Analysis

  • max time kernel
    45s
  • max time network
    589s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    24/03/2025, 12:30

General

  • Target

    Au Bank.apk

  • Size

    8.0MB

  • MD5

    8f565d12c2f974604024a2b5d972e3ad

  • SHA1

    47f4ea058e20d3fb915dfdb87fba60f895441a1a

  • SHA256

    e83f32f70ed8b6d83972eac4225d5ab55734deb95d6e094464730f781b215c6d

  • SHA512

    0ea4eab244097825f5c0d81b39bfa97ded3e4c185fa259fc0c771c204a2137288c0268cc015150137ed4ef49a5feb2c73077a0d8fe952471e6b733d61d14ec2f

  • SSDEEP

    196608:IJc+Nvw7d0mN/jqRd5AdOSChP8Muaq8Wt615UzrzejfD9ccS:D+ml+RdC5ChPR8lt615Oe/9cj

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

Processes

  • com.google.installer
    1⤵
      PID:4273

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads