Analysis
-
max time kernel
19s -
max time network
172s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
28/03/2025, 22:01
Static task
static1
Behavioral task
behavioral1
Sample
d244984f3db507c88731aa6b953fa56a72e832e1ccc0c715d12e4374e63ba2b7.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
d244984f3db507c88731aa6b953fa56a72e832e1ccc0c715d12e4374e63ba2b7.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
d244984f3db507c88731aa6b953fa56a72e832e1ccc0c715d12e4374e63ba2b7.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
d244984f3db507c88731aa6b953fa56a72e832e1ccc0c715d12e4374e63ba2b7.apk
-
Size
2.1MB
-
MD5
95564f880a4dc204efa01fb847ef5098
-
SHA1
0cb00494f1b1e2fbc7123b0e0ccdc10d96bfb302
-
SHA256
d244984f3db507c88731aa6b953fa56a72e832e1ccc0c715d12e4374e63ba2b7
-
SHA512
79a5254aba019d2e45e69b44dae60f3f4d39ccf104a47eaa1946910f8a1708b3b9f242e0638f53fd4eba1542518dd41356a96d0c6baa57dfdb6371e139bc266a
-
SSDEEP
49152:2Q8QajoyIakKl9pPwcxDRCv7Ji9WtN8dVfbnnbbVbR/rTZ5LIGdG:2Q8Y4lgcuvtiuUfbnbb1lrTZ5LtdG
Malware Config
Signatures
-
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.example.application -
Requests changing the default SMS application. 2 TTPs 1 IoCs
description ioc Process Intent action android.provider.Telephony.ACTION_CHANGE_DEFAULT com.example.application -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.example.application -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.example.application -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.example.application
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24B
MD55145655c8ab2e2eae4e3ce6029f0dd95
SHA1f928e17dc187ee45c5c5aa642a81581a6d9011b4
SHA25607e38eb82ff93a8e191fc0efe9e64d2a596a2be46fee17ea69408344f76a3336
SHA512ffd138b32a3d10bc63616d1bb70418d76a74964f32899791a2c58c793f02dfd45343195518971ee76c76207058d7ed7012811e132fd0820b2573b14b11e49496
-
Filesize
8B
MD54c1e3d62eabfabb8328114e3a0352667
SHA182886f8d40f5581d0d521af8b375ed4f4a3a5495
SHA256b0b9b06ed6d43658a08579a0ddf5dfd998d9a0d8be1dd95077d04541b81e1ea9
SHA512de26ab4cf234499b899402ef1ae4c76027efc13302a9f0bf284d25b946b5bd061a83ef7ddace332cfbaad51cb9a80236fa868a5212efc3251e5601d2ee4fd13d
-
Filesize
1KB
MD590afee09722a443d63e4c9c5c66b2fab
SHA139a8d0e9b5f830505e49919001419df9b9adcdcd
SHA25668a65424560d8f64d38a083e4213f59420b6ec54b194cadd840c5de453efeaba
SHA5129d09f63ab6ab67ec3c643d66c5422a8e7aeda5b7cd8fe18dea24749f21128e251c311b60ef975f61490cd2456357e127b2d4796954d7c7425a01cc2f4593804b