Analysis
-
max time kernel
84s -
max time network
131s -
platform
android_x64 -
resource
android-x64-arm64-20240514-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240514-enlocale:en-usos:android-11-x64system -
submitted
22-05-2024 12:11
Static task
static1
Behavioral task
behavioral1
Sample
AAAOlineV1.12.1.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
AAAOlineV1.12.1.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
AAAOlineV1.12.1.apk
-
Size
13.6MB
-
MD5
7c85932ee309fe53e3da1b52b08ab231
-
SHA1
85255dc8a4085644dcd984c17aa881b67e7b6f1f
-
SHA256
74b99a307b562bb2e61cad33e5a3d1bc4d5a0caffe620f329b1262aa74293d8b
-
SHA512
503c5c7ba17edb22b88361cfd065fed22aeb0208f3ba4b34aac37d55b93a3106533491a0f2f2ee8de0518706dafae889774e0e470de6e72387a556b12049d0cc
-
SSDEEP
393216:EpazKOUKNyPm1nhHhZ9fFobs/OfxBmzXQhabZaWI:ItOXNB1hBZNFbOfxBmDuf
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 14 IoCs
Processes:
org.outline.android.clientorg.outline.android.client:vpnioc process /system/bin/failsafe/su org.outline.android.client /data/local/bin/su org.outline.android.client:vpn /system/bin/su org.outline.android.client:vpn /data/local/xbin/su org.outline.android.client /system/app/Superuser.apk org.outline.android.client /system/bin/su org.outline.android.client /data/local/su org.outline.android.client:vpn /data/local/xbin/su org.outline.android.client:vpn /sbin/su org.outline.android.client:vpn /system/bin/failsafe/su org.outline.android.client:vpn /data/local/bin/su org.outline.android.client /data/local/su org.outline.android.client /sbin/su org.outline.android.client /system/app/Superuser.apk org.outline.android.client:vpn -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
org.outline.android.clientdescription ioc process File opened for read /proc/cpuinfo org.outline.android.client -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
org.outline.android.clientdescription ioc process File opened for read /proc/meminfo org.outline.android.client -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
org.outline.android.clientdescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener org.outline.android.client -
Checks the presence of a debugger