Analysis
-
max time kernel
179s -
max time network
188s -
platform
android_x64 -
resource
android-x64-20240603-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240603-enlocale:en-usos:android-10-x64system -
submitted
06-06-2024 14:07
Behavioral task
behavioral1
Sample
6cae7dd0618ef01e6443c0e23ce2f01e2bc1e981598bf76c99b9b2e17ae920a5.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
6cae7dd0618ef01e6443c0e23ce2f01e2bc1e981598bf76c99b9b2e17ae920a5.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral3
Sample
6cae7dd0618ef01e6443c0e23ce2f01e2bc1e981598bf76c99b9b2e17ae920a5.apk
Resource
android-x64-arm64-20240603-en
General
-
Target
6cae7dd0618ef01e6443c0e23ce2f01e2bc1e981598bf76c99b9b2e17ae920a5.apk
-
Size
9.3MB
-
MD5
454b9a2948df592c048d4e8028857a06
-
SHA1
f3df143c9283cfaf3d70eac01858232e7ccdca5f
-
SHA256
6cae7dd0618ef01e6443c0e23ce2f01e2bc1e981598bf76c99b9b2e17ae920a5
-
SHA512
28490d4738b7c279d0982a89bff65d6ee1b5a6ec3a036e085912e874299d52deb9c76fb082c2310695a23418acf6195e18b3526fed62543aecb65b3126b1384e
-
SSDEEP
98304:V1KdIxWk07qeUquwSVll34Ij33IsGmzfzBOTZ0t4LAvfKV:7KdI1+3UkkMXsxzw2qV
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
against.home.knewdescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener against.home.knew -
Acquires the wake lock 1 IoCs
Processes:
against.home.knewdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock against.home.knew -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
against.home.knewdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground against.home.knew -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
against.home.knewdescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo against.home.knew -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
against.home.knewdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone against.home.knew -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
against.home.knewdescription ioc process Framework service call android.app.IActivityManager.registerReceiver against.home.knew -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
against.home.knewdescription ioc process Framework service call android.app.job.IJobScheduler.schedule against.home.knew -
Checks CPU information 2 TTPs 1 IoCs
Processes:
against.home.knewdescription ioc process File opened for read /proc/cpuinfo against.home.knew -
Checks memory information 2 TTPs 1 IoCs
Processes:
against.home.knewdescription ioc process File opened for read /proc/meminfo against.home.knew
Processes
-
against.home.knew1⤵
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries information about active data network
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:5227
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Virtualization/Sandbox Evasion
2System Checks
2