Resubmissions

23-05-2024 07:38

240523-jgwxashg5y 7

23-05-2024 07:03

240523-hvttesha21 7

23-05-2024 06:23

240523-g5t2hagc61 7

22-05-2024 03:55

240522-ehay1abe3w 7

Analysis

  • max time kernel
    610s
  • max time network
    628s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240514-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240514-enlocale:en-usos:android-11-x64system
  • submitted
    23-05-2024 06:23

General

  • Target

    CANARA BANK AADHAR KYC.apk

  • Size

    5.1MB

  • MD5

    d90a6ead45b6e5149c7c64217cca51ac

  • SHA1

    47b658b064cf3fad14194dced9145ef33b2bf897

  • SHA256

    afec45c1051376d3e8fc57ed5bbe33cb619ab71c88ee20920bb1384ee5c6ea54

  • SHA512

    59ec7e7ecb83e0e29959ee74e278b4944b2bb2cba9107f159c93063464af2da92427b0391ba033a3c4caa3ba327032e2922d57f2ed507a513f1c0e44daace85f

  • SSDEEP

    98304:XKMrJZC1oPBy7ESY173tT9dXKzr0kqqy7jtLtqHgwX3PmMLtuxMDyICcLcOT:aM7oETtTXEgkqrRt67kquIGE

Malware Config

Signatures

  • Checks CPU information 2 TTPs 1 IoCs

    Checks CPU information which indicate if the system is an emulator.

  • Checks memory information 2 TTPs 1 IoCs

    Checks memory information which indicate if the system is an emulator.

  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

Processes

  • com.my.newproject50n13
    1⤵
    • Checks CPU information
    • Checks memory information
    • Makes use of the framework's foreground persistence service
    • Obtains sensitive information copied to the device clipboard
    PID:4567

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads