Analysis
-
max time kernel
1s -
max time network
150s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
27/03/2025, 14:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e4e97090e9fd6cc3d321cee5799efd1806b5d8a9dea7c4872044057eb1c486ff.apk
Resource
android-x86-arm-20240910-en
5 signatures
150 seconds
General
-
Target
e4e97090e9fd6cc3d321cee5799efd1806b5d8a9dea7c4872044057eb1c486ff.apk
-
Size
340KB
-
MD5
f48122e9f4333ba3bb77fac869043420
-
SHA1
02cc4cd5fbe40983ce084b9fa92d75c1d3da4954
-
SHA256
e4e97090e9fd6cc3d321cee5799efd1806b5d8a9dea7c4872044057eb1c486ff
-
SHA512
fe6b244a9b84ec76ec8c0c28ae0b30ebd8de4c5aa43a9b6269b1d7358d8ec5c0a8fc8bd99bdbf0f71d2e68fc08e71882731b15eb4141109b3de5fd4b7d90e791
-
SSDEEP
6144:AVknR9v8MnFle/shzyqEZd5KDixU5YBqukraN5jGh2fQzwETloY:AoUMFlzhzw50iEKKaNWFvTSY
Score
8/10
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 2 IoCs
ioc Process /system/bin/su com.example.loader /system/xbin/su com.example.loader -
pid Process 4278 com.example.loader -
Domain associated with commercial stalkerware software, includes indicators from echap.eu.org 1 IoCs
flow ioc 11 alog.umeng.com -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.example.loader -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.example.loader