Analysis
-
max time kernel
128s -
max time network
136s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
05-07-2024 01:02
Behavioral task
behavioral1
Sample
0c97ebf202351d579c1151ea79edadb1195bb5b8823b7d73b600b15f4f13eb8a.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
0c97ebf202351d579c1151ea79edadb1195bb5b8823b7d73b600b15f4f13eb8a.apk
Resource
android-x64-20240624-en
General
-
Target
0c97ebf202351d579c1151ea79edadb1195bb5b8823b7d73b600b15f4f13eb8a.apk
-
Size
9KB
-
MD5
2525745bb64d1284716f7d00726a2fb0
-
SHA1
87ea1828f7bf3c7c675a8ef7b5b39f0d72a49a4a
-
SHA256
0c97ebf202351d579c1151ea79edadb1195bb5b8823b7d73b600b15f4f13eb8a
-
SHA512
53d79f0af347da64fc524bf144911ea9afbb01d56083548db58dc2a11d7c0581e4475472197855164c1215865825b1f3f2ab8b05f02dbf1ee5456c380f24eea4
-
SSDEEP
192:0Lt7+5Nihm1esfNn5ipBQVDG399zdlPkluTgPdD1IexT0wlbNhSv:0LtVhm1eszi/QdG3vhl8l+IdDaex7PQv
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.metasploit.stageioc pid process /data/user/0/com.metasploit.stage/files/ij0l55.jar 4408 com.metasploit.stage /data/user/0/com.metasploit.stage/files/met.jar 4408 com.metasploit.stage -
Acquires the wake lock 1 IoCs
Processes:
com.metasploit.stagedescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.metasploit.stage -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.metasploit.stagedescription ioc process Framework API call javax.crypto.Cipher.doFinal com.metasploit.stage
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/com.metasploit.stage/files/ij0l55.jarFilesize
1KB
MD5dbbd51eee2aac8a8d440f5bb9aafdce3
SHA16c2f4df910ab38fcab2d2abc18a7021d25ce9bcc
SHA25602e2b9b1c8e04cd09054dde4df5260ef33574fb1b6106659c23ae36c5f49603d
SHA5128db4da89e0633336a88ccfde568b48c8818a2ecdf6c60db76118006cf07502292d9b788d01d774db6be4dd7031cb61cef2aa9d497259048c168b8244f6fa757f
-
/data/user/0/com.metasploit.stage/files/ij0l55.jarFilesize
2KB
MD5cfb84ada25534b7e1c598210f1b4a23b
SHA1f6f735f682eca65554e593a026fe26c75ece7f1d
SHA2565fbca4c9e95c21192b6c0669962b78363bef0a587702b1bc01b1c1e081d34be0
SHA5122c8c662aec53796c2bb661cefc9e49fc3d66c7e51b02f5add63725fca7ee64ea357dfc0a6d0bf0d1457cbf0b412de7a571374f94d771168b9a2fea0b0b847372
-
/data/user/0/com.metasploit.stage/files/met.jarFilesize
67KB
MD5281c9d5a4014bb0c340f84ed47e2ed0d
SHA14bbee90fcc1ba4271806769df315a80559863313
SHA256c908fc3f589e5f8589ca7698462f0b08383887a331f792d19effa12c2b1282aa
SHA51296b3aaa3e04ddd3cfd376e1b41b83fa4a39416e1197d43de75b52c10132240f5da6ed35c6fddece5f2c1efb077c6560d2c45d512aa1bac5ca2b0b6b638ea58f7
-
/data/user/0/com.metasploit.stage/files/met.jarFilesize
159KB
MD5402d99e71a07ce7abbcf636dea997f11
SHA1403cda18669e038b75176c175af004753515c60f
SHA256fdf8db5a29fce18bf80acd3dec49c30ab7962038ebdff2c7ed9b0a413550d6dc
SHA512a3a6251bedb46cfb02cb151557d498fc48ee6dec5a6546badef7a8f501de57527dcf1fa6b67ec459ecd394ce9258734b4e43ac088e5b19fd9d7f98cac4c99399