Analysis

  • max time kernel
    26s
  • max time network
    131s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240514-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240514-enlocale:en-usos:android-11-x64system
  • submitted
    22-05-2024 11:58

General

  • Target

    drawer.apk

  • Size

    3.5MB

  • MD5

    fbab3b301d93a9eb4c62f0802beba473

  • SHA1

    9e9dfecf608d27c747fafcdbf5e5ca61774c199c

  • SHA256

    a321ebaa92dce5836cb0fce6743f4ff5b2b177350d74fd6822da82baaa3c8a92

  • SHA512

    1474b541fac318f67cc2c17288eaa4e0f0e0ab8e998b79998cac7bc97ae79cc9116d4d8c8bbcc6dac1625179de124347f3fc63217c701988ff8a688690ce7fae

  • SSDEEP

    98304:q41/9CTd3wz/yw3evtmVQCHgXyBx7BEIBYrmlnd:q456dAz53amVQCHH7BJYGd

Malware Config

Signatures

  • Checks CPU information 2 TTPs 1 IoCs

    Checks CPU information which indicate if the system is an emulator.

  • Checks memory information 2 TTPs 1 IoCs

    Checks memory information which indicate if the system is an emulator.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

Processes

  • com.sherdle.webtoapp.demo
    1⤵
    • Checks CPU information
    • Checks memory information
    • Obtains sensitive information copied to the device clipboard
    PID:4633

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads