Analysis
-
max time kernel
161s -
max time network
132s -
platform
android_x64 -
resource
android-x64-arm64-20240514-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240514-enlocale:en-usos:android-11-x64system -
submitted
26-05-2024 12:58
Static task
static1
Behavioral task
behavioral1
Sample
ysyy.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
ysyy.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
ysyy.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
ysyy.apk
-
Size
5.3MB
-
MD5
818de386f21610b720c9b71e97fbd582
-
SHA1
196ea309ef5b3e2e6dd54c3232d8f87fc546aa70
-
SHA256
c30231e1803681eac62ca076b74d870cd4d4dd843f3b79c23d5a2a00a4a81fc3
-
SHA512
de18fbad059326f13e1c91540c0bd64d12ae68c8a670a77b094896cc487089740176454f252cda495aaaa014aa9111d2fa502ba9ac393da82ebe74bbba59e9ca
-
SSDEEP
98304:T3ASO4U8Z3TlD0YAg3gJI5yDiF0hWWF+yKmB6UOgFlYMuaB03aaB03NaB03JaB0M:r04vTvBL5yD2wWFfUV0A0qA0dA0ZA0Af
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo net.yunshi360.ysyy -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo net.yunshi360.ysyy -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener net.yunshi360.ysyy -
Checks the presence of a debugger