File name:

CLIENT.apk

Full analysis: https://app.any.run/tasks/feb5f537-6e27-40c5-b26f-f313578738f7
Verdict: Malicious activity
Analysis date: April 29, 2025, 14:20:37
OS: Android 14
MIME: application/vnd.android.package-archive
File info: Android package (APK), with AndroidManifest.xml, with APK Signing Block
MD5:

E05F642A954E5FA5D06C56CF04C00B2D

SHA1:

19D28D4F2677D6311CCC90C74806383931F2C0BC

SHA256:

2BBE9CD94760FFE4F2AC5058343C25D7E9A24C5C678A1D3493999DE2A5EA18DC

SSDEEP:

98304:WQuKsHcuv+DyijWvJUEbpLK4rj6m5iUYy1T2X/iWjUIvwcIvxaHYnCg3m1/xE3iU:XFBkZ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Launches a new activity

      • app_process64 (PID: 2255)
    • Requests access to accessibility settings

      • app_process64 (PID: 2255)
    • Accesses system-level resources

      • app_process64 (PID: 2255)
    • Collects data about the device's environment (JVM version)

      • app_process64 (PID: 2255)
  • INFO

    • Dynamically inspects or modifies classes, methods, and fields at runtime

      • app_process64 (PID: 2255)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.apk | Android Package (73.9)
.jar | Java Archive (20.4)
.zip | ZIP compressed archive (5.6)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0002
ZipCompression: Deflated
ZipModifyDate: 1980:01:01 05:30:00
ZipCRC: 0xef917095
ZipCompressedSize: 2359
ZipUncompressedSize: 9464
ZipFileName: AndroidManifest.xml
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
5
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start app_process64 app_process64 no specs app_process32 app_process32 no specs app_process32

Process information

PID
CMD
Path
Indicators
Parent process
2255cybershieldx.rainbow /system/bin/app_process64
app_process64
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
2321com.android.systemui.accessibility.accessibilitymenu /system/bin/app_process64app_process64
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
2407zygote /system/bin/app_process32
app_process32
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
2418webview_zygote /system/bin/app_process32app_process32
User:
webview_zygote
Integrity Level:
UNKNOWN
Exit code:
0
2457zygote /system/bin/app_process32
app_process32
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
Total events
0
Read events
0
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
83
Text files
11
Unknown types
0

Dropped files

PID
Process
Filename
Type
2255app_process64/data/data/cybershieldx.rainbow/cache/oat_primary/arm64/base.2255.tmpbinary
MD5:
SHA256:
2255app_process64/data/data/cybershieldx.rainbow/files/profileInstalledbinary
MD5:
SHA256:
2255app_process64/data/data/cybershieldx.rainbow/shared_prefs/WebViewChromiumPrefs.xmlxml
MD5:
SHA256:
2255app_process64/data/data/cybershieldx.rainbow/app_webview/Default/Local Storage/leveldb/MANIFEST-000001binary
MD5:
SHA256:
2255app_process64/data/data/cybershieldx.rainbow/cache/WebView/Default/HTTP Cache/Code Cache/webui_js/indexbinary
MD5:
SHA256:
2255app_process64/data/data/cybershieldx.rainbow/cache/WebView/Default/HTTP Cache/Code Cache/wasm/indexbinary
MD5:
SHA256:
2255app_process64/data/data/cybershieldx.rainbow/cache/WebView/Default/HTTP Cache/Code Cache/js/indexbinary
MD5:
SHA256:
2255app_process64/data/data/cybershieldx.rainbow/app_webview/Default/Local Storage/leveldb/000001.dbtmptext
MD5:
SHA256:
2255app_process64/data/data/cybershieldx.rainbow/app_webview/Default/Local Storage/leveldb/CURRENTtext
MD5:
SHA256:
2255app_process64/data/data/cybershieldx.rainbow/cache/WebView/Default/HTTP Cache/Code Cache/webui_js/index-dir/temp-indexbinary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
25
DNS requests
11
Threats
5

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
445
mdnsd
224.0.0.251:5353
unknown
579
app_process64
216.239.35.0:123
unknown
579
app_process64
216.239.35.8:123
whitelisted
579
app_process64
216.239.35.4:123
unknown
2255
app_process64
216.24.57.252:443
dogerat-free.onrender.com
RENDER
US
suspicious
2457
app_process32
172.217.18.3:443
update.googleapis.com
GOOGLE
US
whitelisted
2457
app_process32
142.250.185.78:443
dl.google.com
GOOGLE
US
whitelisted
2457
app_process32
142.250.186.164:443
GOOGLE
US
whitelisted
2255
app_process64
142.250.186.164:443
GOOGLE
US
whitelisted
2407
app_process32
172.217.18.3:443
update.googleapis.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.142
whitelisted
dogerat-free.onrender.com
  • 216.24.57.252
  • 216.24.57.4
unknown
update.googleapis.com
  • 172.217.18.3
whitelisted
dl.google.com
  • 142.250.185.78
whitelisted
clientservices.googleapis.com
  • 172.217.18.3
whitelisted
fonts.gstatic.com
  • 142.250.184.227
whitelisted
www.gstatic.com
  • 172.217.18.99
whitelisted
content-autofill.googleapis.com
  • 142.250.184.202
  • 172.217.23.106
  • 142.250.74.202
  • 142.250.185.106
  • 142.250.185.138
  • 142.250.186.170
  • 142.250.186.106
  • 216.58.212.170
  • 142.250.185.170
  • 172.217.18.10
  • 142.250.185.74
  • 172.217.16.202
  • 142.250.185.234
  • 142.250.185.202
  • 142.250.186.42
  • 142.250.186.138
whitelisted
apis.google.com
  • 216.58.206.46
whitelisted
play.google.com
  • 142.250.184.238
whitelisted

Threats

PID
Process
Class
Message
Misc activity
ET INFO Android Device Connectivity Check
341
netd
Not Suspicious Traffic
INFO [ANY.RUN] Host dynamic web apps service (.onrender .com)
341
netd
Misc activity
ET INFO DNS Query to Online Application Hosting Domain (onrender .com)
2255
app_process64
Misc activity
ET INFO Observed Online Application Hosting Domain (onrender .com in TLS SNI)
2255
app_process64
Misc activity
ET INFO Observed Online Application Hosting Domain (onrender .com in TLS SNI)
No debug info