Analysis
-
max time kernel
146s -
max time network
152s -
platform
android-13_x64 -
resource
android-33-x64-arm64-20240910-en -
resource tags
arch:arm64arch:x64arch:x86image:android-33-x64-arm64-20240910-enlocale:en-usos:android-13-x64system -
submitted
30/03/2025, 10:46
Behavioral task
behavioral1
Sample
client.apk
Resource
android-33-x64-arm64-20240910-en
General
-
Target
client.apk
-
Size
760KB
-
MD5
49d4ef134bd0f640742023117e5c2e21
-
SHA1
5dcd927edaae792444bf01adc27e9cb744edb824
-
SHA256
29a97e6d45ef1c7b72b475db90f2f9f79e9ceac90bdf24322e9ed7b180175751
-
SHA512
327204a037726c2e98927b936d90289a3b00d2c72f8f1566e5b19d75281e77b1730e7aeb4b9ab87e39a28b9c3f8ec103d82488c2dafd637efc1a6e8711636592
-
SSDEEP
12288:ky1Ob1a1a8LreXKnvrDM/5WmpYshXZPbGwidNpgB9:kyGa1a2eXqrDM/5WmD9idNpA
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground cmf0.c3b5bm90zq.patch -
Tries to add a device administrator. 2 TTPs 1 IoCs
description ioc Process Intent action android.app.action.ADD_DEVICE_ADMIN cmf0.c3b5bm90zq.patch
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD507a495aa314ffe6eabf501b905eb80e8
SHA128f775322f78645942ffb3d7e43603bf6e39c846
SHA256fba852fc521c9ba22f20f4820f6cff23c76933e7eb548e7548d5f8ef0443dd88
SHA512d5c1ee3ccbc60a0b183a8e40387c9eebae685fd5e018d696167b9011b9044e669cfa470812aa10763a5d3997e9fa96682ac8e71417e708c3d28ba44c696c0837
-
Filesize
1KB
MD54f0e20dd608e96ccf9236b220a186e92
SHA1c11b2088bc4f94f09892b39ebde54f82229e883a
SHA256030071b58307c8a0852669d42faa5b09f8a17e395742a2cb465630e7e0cdd9c3
SHA512bbdf2bb0c3a15ce3a1e5ce7da8baa6d8905cba90dcd4e28f3497cfea435acc3676f96e50235b15a7eff815d37a251af74b86e34de4ac7e05dfe0850a314c7d2f
-
Filesize
78B
MD5edb876a417a06ff55949e59dde35ff69
SHA1fc6634e73a431784f66b80a74e5064be15173ce3
SHA25673a0fd42c162521235d0ec628438759a1d2964abeec9761c39184d673a9b21a1
SHA5120935a77b4cec3935e3697f9583d08a964907e4b13ddd71a1464483b055490e48a250bb974d98bacf0272fbe9c8e20a21b3b3163f57fd38fe3cf7a885957eea48
-
Filesize
85B
MD5ef7ef9522760143c07b444e9daf6c37a
SHA19d5443dcbb18fdfe028342fabd9b8986449dce78
SHA2567660d7bdf5edcb15b9f3d3449f32427dc04181e9d7432dd45dc79af200f9cdf8
SHA512dd061e2a790de2f94a6a4264aaf1c25369105cad8f6cfb78215f72ad934219a1ef087fff6882e1efab73bbdf1c4172b3d6085790f2076d01e67f5a99ed5f9d27
-
Filesize
1KB
MD57fd56ca0afef1bbd64577368c4b81b35
SHA1a0517cc8312d1dc3c4547f943c614d5d29ba5fcb
SHA256e8028461d038bb321741e574fee7fae933a054dff973f8b3c8a3fca816b4e6e6
SHA51299377f58d9b1a486e71570fdc0e06b31145c8d008f6aafa54ec883e3657b8922e40dce26d4d19c01a0394b067269223f42c23b4dc74df8d95566c544d563597e