Analysis
-
max time kernel
146s -
max time network
151s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
30/03/2025, 10:43
Behavioral task
behavioral1
Sample
client.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
client.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
client.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
client.apk
-
Size
760KB
-
MD5
49d4ef134bd0f640742023117e5c2e21
-
SHA1
5dcd927edaae792444bf01adc27e9cb744edb824
-
SHA256
29a97e6d45ef1c7b72b475db90f2f9f79e9ceac90bdf24322e9ed7b180175751
-
SHA512
327204a037726c2e98927b936d90289a3b00d2c72f8f1566e5b19d75281e77b1730e7aeb4b9ab87e39a28b9c3f8ec103d82488c2dafd637efc1a6e8711636592
-
SSDEEP
12288:ky1Ob1a1a8LreXKnvrDM/5WmpYshXZPbGwidNpgB9:kyGa1a2eXqrDM/5WmD9idNpA
Malware Config
Signatures
-
pid Process 4264 cmf0.c3b5bm90zq.patch -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground cmf0.c3b5bm90zq.patch -
Tries to add a device administrator. 2 TTPs 1 IoCs
description ioc Process Intent action android.app.action.ADD_DEVICE_ADMIN cmf0.c3b5bm90zq.patch -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver cmf0.c3b5bm90zq.patch
Processes
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Privilege Escalation
Abuse Elevation Control Mechanism
1Device Administrator Permissions
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5eae4baa0dd8a82fe4a2e68cfc3132399
SHA13c77dda7f2f1929a67be59e362081ff5a4a28f01
SHA2567a08c048c5410abd2f2d9f575030b028edb1772954f453eec653b87c6ed34919
SHA512d56bc87da5add1a599a9b68d531e8ed0cdb3ff9a085a0966aa4eb8a6c06d312c2f36160b6d5667ee8853a0685c92fd41255b6135ebbb4bde2f483c8701b0daac
-
Filesize
85B
MD50d8d7fe73b423d0bd713838cd283d6a8
SHA1904eed0e9b215dd80bf73645f80bbb27ae280711
SHA256a79313ebf290b74ad5956d181bfe61c7ff52face615ed4ee8c991f7baed73596
SHA512c7c810eb60947b99db4c409beaa744872a442d5de8de7f69de9bc75f093642b1e130eb047303b48d9cd283dc6d8f310106c017929c9291fbf8ebb86934d6d290