Analysis
-
max time kernel
7s -
max time network
160s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
03-05-2024 09:50
Behavioral task
behavioral1
Sample
build.s.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
build.s.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
build.s.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
build.s.apk
-
Size
346KB
-
MD5
83df4ac5ea51422f75145ac2d95c7b18
-
SHA1
c4f8405308257b7f669d49e92fab7484c6db35a3
-
SHA256
c854db64b9926947cb0f82d53e0dcd775f644e5c5d5a15133d03cc194e1c9689
-
SHA512
d22c271964349133a095d01c9eae03488ae59bc2c736d315f43115f93caf751b5e5784aa5ab1f04793bf4af91d5347ebe50692cb5f01743b6474476e92834ffa
-
SSDEEP
6144:cEPXpltG9Yqym29Fdb7Nsyjx0Vc0nfIE4JTDyq2PQrqON5Oe0HWn/rMDxobB:cERltGuqyjJbGEac0n1kDmPQrLNwe0HC
Malware Config
Signatures
-
pid Process 5075 com.etechd.l3mon -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.etechd.l3mon