Analysis
-
max time kernel
50s -
max time network
161s -
platform
android_x64 -
resource
android-x64-20240506-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240506-enlocale:en-usos:android-10-x64system -
submitted
08/05/2024, 03:56
Static task
static1
Behavioral task
behavioral1
Sample
fb4fb2ec4875415476fc54dbbda28ff969fa0f369bd2778ef4fccd82eb298f73.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral2
Sample
fb4fb2ec4875415476fc54dbbda28ff969fa0f369bd2778ef4fccd82eb298f73.apk
Resource
android-x64-20240506-en
Behavioral task
behavioral3
Sample
fb4fb2ec4875415476fc54dbbda28ff969fa0f369bd2778ef4fccd82eb298f73.apk
Resource
android-x64-arm64-20240506-en
General
-
Target
fb4fb2ec4875415476fc54dbbda28ff969fa0f369bd2778ef4fccd82eb298f73.apk
-
Size
10.0MB
-
MD5
f2b91a4b3c05ca881dc84aabcc9385f3
-
SHA1
526a5b1a2fbe7152070980993ed7545cece4dcd4
-
SHA256
fb4fb2ec4875415476fc54dbbda28ff969fa0f369bd2778ef4fccd82eb298f73
-
SHA512
fcfcade77afef296c256c08d6e4f860c73a0bd5f0f89cb4b9089e383e175e6d3a01698fc262696d9eef6bb27fc1db7a8509d4e095c1d8cdf00f762f5c1746d65
-
SSDEEP
196608:ENYp0Pr2jo1EDJ20rHIwwYl4Hy6zOdnfT0uueOWLN91G2cnSMxZcu:Jp0CjoUgoHIKp6S1gOb1GVnVxZT
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo ir.me.raven -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo ir.me.raven -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener ir.me.raven -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone ir.me.raven -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver ir.me.raven -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock ir.me.raven -
Checks if the internet connection is available 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo ir.me.raven
Processes
-
ir.me.raven1⤵
- Checks CPU information
- Checks memory information
- Obtains sensitive information copied to the device clipboard
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Acquires the wake lock
- Checks if the internet connection is available
PID:5104
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD55beb044b3a82fc4453558155e8b5afb2
SHA113b407d2479b81ff51bc5b73a26b087e70279ae7
SHA2560156929c69b84342e65fce7f937a78011d8ead26b5509481ae9c2838e6bf654d
SHA51234c36814f6710e119edd2e86ff582ab2e91166c2b27b0a9c52e9a01351303a695add0a1a7c4a6f0e2a14d58f0d1017df667b05e13cfc8708fc32f5f58f9e76e0
-
Filesize
512B
MD53a4066d019e52e9efcedb6f27f97bf14
SHA1e12b1ddae8646bfb68f43044b5056c27681ca9b7
SHA2564ec517fb0ce55571779f0071ce47beb75e36725fefbbc76fba76d5569a3f4758
SHA5120657ade2bac78d945b4d132c2967280a71a9a5c516f2fcab117c39bbd2a5615bc37d70a2ef2a9c8dbf3694273e11885f66304b3c17817c562769ca5b599f29d0
-
Filesize
8KB
MD563db6b71de990c22bc81f4305ed1b3c7
SHA1b4cda66c8e63b80bf6359e6d2009a79e3d2e5011
SHA256979721c2fb3b3634152b4aaa7a0a9ee96e74f755160aa8ab5e63a70d94ff284e
SHA5129573f629d652973ce86afd957713a6cd958213c55a785a2f62fae918b2f7685eab9439694bfe517637646fd133ade8ba22ee79c7793f2107f0acf1c3959961c7
-
Filesize
8KB
MD509a70165c0b8c8bde55f5a21e4e189b2
SHA186f059b0ac025dc83f3b080f5466fa55ebbfc55e
SHA256f8b57dbefdebf92c041b138a4cec1c92448d56bfe0c68934e1dbb79435b1e348
SHA51218e74b37a57fb043865503be3894338249311771304fb0630ab8fe3b890dc1ba7a720c536e1d960f713b332b289d0d20e35821cf2832cbdca946a712376b3ded
-
Filesize
90B
MD5982c060baa7f923a02faea6d26f77fee
SHA16af870974503bb9c25a26d50feb1482b30a87c1e
SHA25624338e6e79ed7a57c428011b81f91dd3b3e0a924e3032d60dc664fd0dabd20ee
SHA512b0bacc8eb970bd619810afe9860e01e61135df71f5b8eefe838915892fbe4d3c445e85692d5edafa3349a15e518d8099cb436c179deca2f31ff838299e953075
-
Filesize
569B
MD5c9cdf4a276caab3d8565233698432051
SHA1e6d928ca42dadfc023108dca9cd394291b3b9a65
SHA25600a3c45ac4cb8a5bd1f438a206ed4f8d310e5063b7822b910bab3c7ab33c6aaa
SHA5129c2ec15a7e2fb912da35a3122120d23febd6ca02e2c2ec051e4e7f3cbb9c1c646101428ce9cb3a19b2fbd59b0173f73fd6f88690129c0fb06e2ed4ad0ce90dff
-
Filesize
24B
MD5fcb84f1b8252deeaedf90d22241eec32
SHA1958f804333e2ef838207ffe09e80188e916aadc2
SHA256b7fb802e7798f0e6c79e9279e87a2162fab46a4a057a531eb01a3222e48d975c
SHA512973e1fbedc70415b9c4470b45b3b43ca9a330cbbbd4a1d88f4f17c19485355206d1250f541e95b9d8cacb6bc3e7e86e9de0a31258a2b26d1b579f234bc9af605