Analysis
-
max time kernel
101s -
max time network
157s -
platform
android_x64 -
resource
android-x64-arm64-20240506-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240506-enlocale:en-usos:android-11-x64system -
submitted
07-05-2024 17:27
Behavioral task
behavioral1
Sample
TASKMANAGER.apk
Resource
android-x64-arm64-20240506-en
android-11-x64
3 signatures
150 seconds
General
-
Target
TASKMANAGER.apk
-
Size
256KB
-
MD5
20d8603314a52b75dad2a577ef785063
-
SHA1
52a1c165f0346198f1c7af72a964b59df98b2672
-
SHA256
41419a535e1492f32751e19db78bd1f71736b6d3e51fd93feeb65fad36497367
-
SHA512
6b15cc190ac09620170afea44c5354472166b1483364b231745bd4d6b1a7f47782f74f69f65e2852d843ee9fcf5470c61cc1d6d3a64b1b9a740f24e585cc08b0
-
SSDEEP
6144:Gtr/W679Wl+MJR2mEvLWFmglzdiIvBSJI7HarCcgxsA:GH9W1AzglzNJ+I7a0xJ
Malware Config
Signatures
-
pid Process 4937 com.etechd.l3mon -
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.etechd.l3mon -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.etechd.l3mon