Analysis
-
max time kernel
46s -
max time network
145s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
28/03/2025, 22:08
Static task
static1
Behavioral task
behavioral1
Sample
df0730236595e7f7366a5925c13cbc03f2796d0bb1a9448a4508d2a229f63d9e.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
df0730236595e7f7366a5925c13cbc03f2796d0bb1a9448a4508d2a229f63d9e.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
df0730236595e7f7366a5925c13cbc03f2796d0bb1a9448a4508d2a229f63d9e.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
df0730236595e7f7366a5925c13cbc03f2796d0bb1a9448a4508d2a229f63d9e.apk
-
Size
2.2MB
-
MD5
ac915308fd837012e6e009f6bcedb966
-
SHA1
57ade9abc24d2094b0c01129bc7b9f8561261c94
-
SHA256
df0730236595e7f7366a5925c13cbc03f2796d0bb1a9448a4508d2a229f63d9e
-
SHA512
2440529d2ce92ede7c2c3b0fa924b649860e78d11a83768e4f22bdbca12f5ddc2e397f965443bce5c3ee70a0af38519fd88fbc80c90be27683d7a69749586795
-
SSDEEP
49152:O7VfbnnbbVbR/rTZ5LIxC0wcxDRCv7Ji9WtN89z9p8jV6aHw+FgBPd8:Oxfbnbb1lrTZ5LLcuvtiugk9wegdd8
Malware Config
Signatures
-
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.example.application -
Requests changing the default SMS application. 2 TTPs 1 IoCs
description ioc Process Intent action android.provider.Telephony.ACTION_CHANGE_DEFAULT com.example.application -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.example.application -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.example.application -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.example.application
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24B
MD54a5508e4eb8e016cc580b9da4096b86b
SHA1616a7ad125c673b5fe870577b2bb6acec3da362a
SHA25653178ee56d55b98655dfba7fb7681521928ea2bb85e55c4be343b4d238b71ce9
SHA51251e4f4584af41ea670fbcff861d2eea51950ef083491ccad7eb4a3f8b8b0e88b8dd77669c04f65170f7bfb4d90001010576b5e7380c9273181a6975bc457181d
-
Filesize
8B
MD542112c7f0f27da84787590146c3c190a
SHA10c5fd50124a1e26717f7def86213bab652ceb62f
SHA256314cf4d50b87730976240ef909f09654d27ef70a66e40529c1641cd8f81ca113
SHA51267fc48f6ff5b27638cf60bb0841270aafafdaf80a2f946a7fce333edb69f7ab24b375ff94f076ca3e745e93bc0dd6f521b21acf1f7110690defb54146c63eb98
-
Filesize
1KB
MD5d966bfcc7ddd827139c16c3370a12def
SHA178b60147bd3567fe3c6e9ffae15671ccd465e8c3
SHA2566fc227ef47250ada46ea8e28158503c936ddd89f2eb8e4a2aa44ac7cf994be66
SHA512b5eab5577e7f6b5d5d489bf96a3a59ea8d6186c6d7e47c1a960a6085f8c1bde5e0119bc8afd96a348050e18bb05fd5ef2f774d95a33baaf986a58ebd3919c631
-
Filesize
3KB
MD5b971f93b5550d54fcf7b741475e0db30
SHA1c5afd074d5c670996d03d2e0fe133259baa9d296
SHA256b78ed14d4364a94cbc369ba98fca4564fe4b8a04ed2ae700ecd62efd47ba88a0
SHA5121e4d15025b1d442878d0c072f0fce2829daad7c80842bbd12183dfb126cae6409773049fb54f51ddac889246ba6d317743e3778937ca52f4f0401b771b20c9b5