Analysis
-
max time kernel
31s -
max time network
181s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
01-07-2024 04:04
Static task
static1
Behavioral task
behavioral1
Sample
efa90befdb730fdd9f34e446c6b5ad0f.apk
Resource
android-x86-arm-20240624-en
General
-
Target
efa90befdb730fdd9f34e446c6b5ad0f.apk
-
Size
125.3MB
-
MD5
efa90befdb730fdd9f34e446c6b5ad0f
-
SHA1
13b76b810b594e6e8181123686c5b6711eb88e18
-
SHA256
f31277a234580e742648b517ef5c3f72f0993ab4a5aca987321dee018e2c9eee
-
SHA512
694fc574ea0b0c89c4c2f808309c4c59c8b501fc65ce8c7758b8050e8f6aeadadaf37f7d84cfe90bc4a88657b5d4b1e2dc31d80052a09c83bc129909bfecbd37
-
SSDEEP
3145728:MdpNrlUds5Z0Ix17eBtCBX87NyC32XnEQoXr2io+KlzBciq6KB3LjX:epEWZV7evjpL32XOXrQzBcijI3LL
Malware Config
Signatures
-
Renames multiple (52) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks if the Android device is rooted. 1 TTPs 1 IoCs
Processes:
com.mklvana.ShoppingMadnessioc process /system/app/Superuser.apk com.mklvana.ShoppingMadness -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.mklvana.ShoppingMadnessdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.mklvana.ShoppingMadness -
Checks CPU information 2 TTPs 1 IoCs
-
Checks memory information 2 TTPs 1 IoCs
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/storage/emulated/0/Android/data/com.mklvana.ShoppingMadness/files/il2cpp/Metadata/global-metadata.datFilesize
5.6MB
MD54f3bddb4d27395798d8c926e70283d9b
SHA195b8bc4be7a96703118964fd4a51034d8dcd19b5
SHA25694dcb13ebbe5c1e8c44a97d150ee2512f0feda1affbc771e2e9df80444adc2d4
SHA512103aeeba3a26a6262641df0aed0febc67a867061bdeaa7e2af2c105f4902a6619c9d7d762f884c724c6c5bfc9be9d4d96bb1b909429376427b0885929e9fba40
-
/storage/emulated/0/Android/data/com.mklvana.ShoppingMadness/files/il2cpp/Resources/System.Data.dll-resources.datFilesize
91KB
MD54860ddd4350579f8fcacb1881582335a
SHA1493c03e9cfef6f72a00f92023cdb88527dfdf72c
SHA25698a7950ec6de3242c2e190dfa630188dfa32511a125542b94baa952d1c757d49
SHA51251421a1e79914cb6d828305103c5f7cdb020d98107586abd7e04614f65bae8004101e5567a873f52fe2daa3a7984bf4f7a4930e628cc5f86e709e3a37f812a95
-
/storage/emulated/0/Android/data/com.mklvana.ShoppingMadness/files/il2cpp/Resources/mscorlib.dll-resources.datFilesize
329KB
MD521d06dbc8af6432b2b49536ed30609af
SHA111a1c0e2ab2f8c06fe4507535ed47e0dd279a60d
SHA256c5baa176a5b72cd545266340e42102d393a5e43d38c95796bc828918bb95277f
SHA5122971f54eaa14c3ce6e2352e5a1aea5b044f0894bf4eac92de8cd92515b6473b5ca56ebfcad4369a9d4935cbefea2540a83f332fd4d832c37768310e8776ceb5e