Analysis
-
max time kernel
70s -
max time network
152s -
platform
android_x64 -
resource
android-33-x64-arm64-20240229-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240229-enlocale:en-usos:android-13-x64system -
submitted
30-04-2024 04:07
Behavioral task
behavioral1
Sample
Maximum.apk
Resource
android-x64-arm64-20240221-en
Behavioral task
behavioral2
Sample
Maximum.apk
Resource
android-33-x64-arm64-20240229-en
General
-
Target
Maximum.apk
-
Size
14.5MB
-
MD5
75679c0ab3d65a700206eb452cfb4370
-
SHA1
3545119143d963ac12469b30de56a075711f7448
-
SHA256
45bf237d051cffc5c1c40322cd93e001683b8dcbefde874add1a51f77b7a2342
-
SHA512
9ab95950deea6179be9dac0cd8a8da5011aaa58b44180e426ab1a78e1f35c16a4d8afe120f9e2a293c5e2a9be4316576df90981d565a7d2b5396d8d173e64a14
-
SSDEEP
393216:Nu4nrtZGIuaJi0C2StclEskEK98quM2877xQKJiT:h7ji0C2KclNkEK2I2pT
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
-
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Requests enabling of the accessibility settings. 1 IoCs
Processes:
com.appser.verappdescription ioc process Intent action android.settings.ACCESSIBILITY_SETTINGS com.appser.verapp