Analysis
-
max time kernel
164s -
max time network
132s -
platform
android_x64 -
resource
android-33-x64-arm64-20240514-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240514-enlocale:en-usos:android-13-x64system -
submitted
24-05-2024 13:16
Static task
static1
Behavioral task
behavioral1
Sample
app.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
app.apk
Resource
android-33-x64-arm64-20240514-en
General
-
Target
app.apk
-
Size
6.3MB
-
MD5
f0033d4b3bad0340894cba29650a6464
-
SHA1
4cde57a6e116e41b7dad0d3dbae104b554c227cf
-
SHA256
9953a318d8fa00111ee58e8ea1728718457ca070b2377e81db97553c80efbf7c
-
SHA512
976caf9f016196c1cb9d661d3b250b1868c22404c0349f9679f9b39ede14e32d803f65d9daf0f936d2d43bfa763a075fc307cf96fe91de5ed9e1de00cb11ad70
-
SSDEEP
98304:WXrIAvEBdXdOlqZlYfoDhrbLIB9TYIZ7DSJE6PIRUgArJ2bQeoQY0OsPWxDrXIoS:WXkAvEBdXgZEd/hk7DQgArgQYPW94J5
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
io.ionic.lmm13description ioc process File opened for read /proc/cpuinfo io.ionic.lmm13 -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
io.ionic.lmm13description ioc process File opened for read /proc/meminfo io.ionic.lmm13 -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
io.ionic.lmm13description ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener io.ionic.lmm13 -
Checks the presence of a debugger
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5570fea72d91130cdf05c12f6ab5c4431
SHA1315dcf354cdeb4c454cbe93148680c3f0c11a6bc
SHA2565bb65919bed02970d07ae31c79f6d66ff63a63f8d58b25ddc8fbf3d8dc91f73c
SHA512393b4e66d33768303415da29d6b021bc473f6da43baf1e63995f8994f01bdaed580afb65bf9ba949fd7520d6a81a9555d5475ace5d1673180189eabbc52bfc85
-
Filesize
512B
MD5d486d14a137f39dc456c044d914aca30
SHA1023e36721b16056255c12634c7e1250bc4939ec0
SHA25621889f7d8b9bc5422b44d136a3e9064a0a040122bc38f2aa7eed6b552f30238f
SHA512ea329d6b52c7cac139aec07ec45886bbbf8377e9ada85c3e9397b5023226f452cbbb77a66080cff4e034060bb9b6f2d6b6ab3b0ea7387a513aac54405cdf1962