Analysis
-
max time kernel
146s -
max time network
151s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
30/03/2025, 11:14
Behavioral task
behavioral1
Sample
client.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
client.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
client.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
client.apk
-
Size
760KB
-
MD5
6fc9294f3dd37a2fa0fbf869e5c6df8d
-
SHA1
f61bbdae56f02f2ac60f607cf3e47e664e6ec219
-
SHA256
1b083b1514fbbf0b1488a680a1f7f388620acbae4503ef28b3b1a5758fb97421
-
SHA512
138921c008ed51a8fb35af95d021a0b356ddd93ed702b33ed6af66453446d40edd5d801d2e5e9067aef5cec7fdd724bfad68670d14dbde2e55780e413166f8e4
-
SSDEEP
12288:8DZoa1a8LdeCvcHovx95WmpYshXZPbGwidNpgx6:8Ca1a6eCqovx95WmD9idNpP
Malware Config
Signatures
-
pid Process 4222 cmf0.c3b5bm90zq.patch -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground cmf0.c3b5bm90zq.patch -
Tries to add a device administrator. 2 TTPs 1 IoCs
description ioc Process Intent action android.app.action.ADD_DEVICE_ADMIN cmf0.c3b5bm90zq.patch -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver cmf0.c3b5bm90zq.patch
Processes
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Privilege Escalation
Abuse Elevation Control Mechanism
1Device Administrator Permissions
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5967f1df68cea387a4855ebb7bf55d492
SHA19ef89affd458ea8bbfec2504286e38721a402b4b
SHA256aa1d89d054b7250c00cbfada78f1254889ea0452ae307e8737d8c1c3d5ce1ded
SHA512d2f4708b4625a3ea0b6cffc6a465c3df2b99c5d7cd6619801c6453589a67ac4cda8c691c213af1c77097af085e6c4437623c6435f0efba7a7c78268d6973c133
-
Filesize
253B
MD52fd649273f570c6178606b8ad3bc7327
SHA1c0cc2e1d24d0c81f6d28a1a8c136a137c1f25306
SHA2565d304d7f830ba9f8c40986c9ec4aea9bf2d3231b2c60b6c4fdc53e09d480bbfc
SHA5125433dcdefa7209a857b2eec53a4b6adea5a8cacab5051db2dccb7af7cc6ca8441b8c8df74bfe3c2333ade74dfc9c4678a9a81d1fd2fc57296a2a8bd07907988d
-
Filesize
85B
MD529c222c0e3e5fbbafbc2a2561b56af3a
SHA1aa3733230fe5a3dcafae5b7a2cb3da30cb9766c5
SHA2566d908cd1b915743513425ce6c786665276740c8572e16d14223b265e500cc097
SHA512e6bd735b21389fabd453d078e2743dddadcc2d864960f0a15c08cf6ae717e90b5e6b937905e49175696acd698ddb5da6a60bf02e9fca88fe2419c4e1d814cf8e