Analysis

  • max time kernel
    123s
  • max time network
    148s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240514-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240514-enlocale:en-usos:android-11-x64system
  • submitted
    23-05-2024 12:13

General

  • Target

    FanaGram_1.1.apk

  • Size

    3.0MB

  • MD5

    7142945842436542745efbb13bb2b637

  • SHA1

    dca826f4c3b020ad1559562f11703bf8a4368445

  • SHA256

    6b6da8349754085db35bcdc881c72f6318fee85fabe7ab6e9c71baf44862c99b

  • SHA512

    5ba96cb1595f090bab926edaef549a460fe941915f70f9af2d4aac294b15367192c7833a394b42337f1a42ba87f794194e3e954aca66a2ffbe6a851c5591d32a

  • SSDEEP

    98304:YHfKRc3BA0amSJoBNQD0eNdmpFKxfJc7frhEnuY:Ncxg6NI0KdgFKxlN

Malware Config

Signatures

  • Checks CPU information 2 TTPs 1 IoCs

    Checks CPU information which indicate if the system is an emulator.

  • Checks memory information 2 TTPs 1 IoCs

    Checks memory information which indicate if the system is an emulator.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

Processes

  • com.fanasa.fanagram
    1⤵
    • Checks CPU information
    • Checks memory information
    • Obtains sensitive information copied to the device clipboard
    PID:4618

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads