Analysis

  • max time kernel
    175s
  • max time network
    132s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240514-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240514-enlocale:en-usos:android-11-x64system
  • submitted
    23-05-2024 12:42

General

  • Target

    absensi smk_2_1.0.apk

  • Size

    1.1MB

  • MD5

    52f2f951dca33b90ce369590c8602ba7

  • SHA1

    1d4faa53520a0853b52fab1043bfb6723a14855e

  • SHA256

    c031c95ca2f46bcb712feb8caf1d791db2910c56e4f470e2897d9424fb37be7d

  • SHA512

    d571730077976f3495a0289cae055ffd9a926c116444d10f03371b1229f83203ea3c1d1a5b29ee200b03c694e2e35ce97c75ed2918802ebe7fd3444e2e7771c6

  • SSDEEP

    24576:aP6xj1ntykPPL9FiGIsWeQONY/1FC5mxgHoOwTyYJpfX:aP01ntNj9FLWsOvOwTyC

Malware Config

Signatures

  • Checks CPU information 2 TTPs 1 IoCs

    Checks CPU information which indicate if the system is an emulator.

  • Checks memory information 2 TTPs 1 IoCs

    Checks memory information which indicate if the system is an emulator.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

Processes

  • com.smkdira.abs_siswa
    1⤵
    • Checks CPU information
    • Checks memory information
    • Obtains sensitive information copied to the device clipboard
    PID:4595

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads