Analysis
-
max time kernel
179s -
max time network
132s -
platform
android_x64 -
resource
android-33-x64-arm64-20240514-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240514-enlocale:en-usos:android-13-x64system -
submitted
30-05-2024 22:08
Behavioral task
behavioral1
Sample
fadd325a1c2377edb91ab1976ff10598bec7e609ab81b1755af0f2982d45410f.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
fadd325a1c2377edb91ab1976ff10598bec7e609ab81b1755af0f2982d45410f.apk
Resource
android-33-x64-arm64-20240514-en
General
-
Target
fadd325a1c2377edb91ab1976ff10598bec7e609ab81b1755af0f2982d45410f.apk
-
Size
4.0MB
-
MD5
50291d5e2e33807e7282dbe2478982a4
-
SHA1
a870836b41d2fe293594c03c13d977c975d815d8
-
SHA256
fadd325a1c2377edb91ab1976ff10598bec7e609ab81b1755af0f2982d45410f
-
SHA512
5e8dd29919194cfc67a3b292f7833e9b5adaeca1a9040f6f5cdc339e22bb00ca330c162275549af27f278d6691b386827079512b4d9f2342c947b6df21fac641
-
SSDEEP
98304:mlewb/e8C0ksV7X/ZFyniGs3P/IF/QzHP2Zr91:+bmXM7RsiGs3Pk/QS
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo cubes.gears.blot -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo cubes.gears.blot -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener cubes.gears.blot -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS cubes.gears.blot
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5620f0b67a91f7f74151bc5be745b7110
SHA11ceaf73df40e531df3bfb26b4fb7cd95fb7bff1d
SHA256ad7facb2586fc6e966c004d7d1d16b024f5805ff7cb47c7a85dabd8b48892ca7
SHA5122d23913d3759ef01704a86b4bee3ac8a29002313ecc98a7424425a78170f219577822fd77e4ae96313547696ad7d5949b58e12d5063ef2ee063b595740a3a12d