Analysis

  • max time kernel
    19s
  • max time network
    150s
  • platform
    android_x64
  • resource
    android-x64-20240514-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240514-enlocale:en-usos:android-10-x64system
  • submitted
    22-05-2024 12:19

General

  • Target

    AAAoutline-1-11-0.apk

  • Size

    13.0MB

  • MD5

    5e0e5256238b69dd2e86d6564f85685b

  • SHA1

    6826c2d48d8b0f32711b2901c0966f1767cc4d43

  • SHA256

    9cdf037fde06590256c8640ebe3b0f6664f969ba23edd3665c1e129036ac3d50

  • SHA512

    00130f7aee8a740e3709fef0355c226efa23b3bfb8fed1314b4c04f54245d9e3dd8efa8c99e4b5ffe68d16ffdb85fa5712a018e11a14f84a328532ebaee29241

  • SSDEEP

    393216:obu1gdlfEzWPdGRlV9UmsKvbU5ZNXqB5HtRp:GuKiAGR9UtWwdgtX

Malware Config

Signatures

  • Checks if the Android device is rooted. 1 TTPs 8 IoCs
  • Checks CPU information 2 TTPs 1 IoCs

    Checks CPU information which indicate if the system is an emulator.

  • Checks memory information 2 TTPs 1 IoCs

    Checks memory information which indicate if the system is an emulator.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Checks the presence of a debugger

Processes

  • org.outline.android.client
    1⤵
    • Checks if the Android device is rooted.
    • Checks CPU information
    • Checks memory information
    • Obtains sensitive information copied to the device clipboard
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    PID:5117
  • org.outline.android.client:vpn
    1⤵
    • Checks if the Android device is rooted.
    PID:5287

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads