Analysis
-
max time kernel
20s -
max time network
132s -
platform
android_x64 -
resource
android-x64-20240603-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240603-enlocale:en-usos:android-10-x64system -
submitted
07/06/2024, 02:17
Static task
static1
Behavioral task
behavioral1
Sample
e4d7484b888deceefeb17ee346821a0c9d3112dffd5ad57c71f4df7d304580b8.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
e4d7484b888deceefeb17ee346821a0c9d3112dffd5ad57c71f4df7d304580b8.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral3
Sample
e4d7484b888deceefeb17ee346821a0c9d3112dffd5ad57c71f4df7d304580b8.apk
Resource
android-x64-arm64-20240603-en
General
-
Target
e4d7484b888deceefeb17ee346821a0c9d3112dffd5ad57c71f4df7d304580b8.apk
-
Size
2.0MB
-
MD5
71f6cdb3d8eebe1c8e7e26896238e571
-
SHA1
019134386a6d900d61285e5e986249928a9504b6
-
SHA256
e4d7484b888deceefeb17ee346821a0c9d3112dffd5ad57c71f4df7d304580b8
-
SHA512
740e8bcde7462b99972ea472ee0cae53f4f61fcdc6d9ca1c8c44d0661323178c891f7fe82052cd7bae7239d7a953a6dcdb5e6fc42b28cd4acc9e1634e284228b
-
SSDEEP
49152:I8FjWz5Kzip37zl3fg1S1RvyzHth1mFI1/3Go1eiUMG1VummJwga8TGi3U/kX1l5:IIhup37zlviS1GHoFW3aiUM6ummJwgaE
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener pl.spyone.agent2 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone pl.spyone.agent2 -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver pl.spyone.agent2 -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo pl.spyone.agent2 -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo pl.spyone.agent2
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5dd46d6cae176055d8617ceb3d40f1d96
SHA1b7a971b5f755f7fd5f9041bb1a0ffb1a74d9dd57
SHA256c4d2fc19a3c54c2d2cadde804546ce6f62f960865b829ea240026e1ea2706e96
SHA51254d353f7e746aa3935848cc2f694cd6cfbd1c59b6f56e276b76fad0f0a4c8ea09cd4835be8a8ccd615a7714d3e212a091d93a2b3b835f4ea767c8ba5950a5516
-
Filesize
512B
MD55a9a35ae334f9ed4595c92a917078231
SHA14b7298751a9df94c8a6f5edb122c08b21953ed7b
SHA25608b7faecb4ff0d6b71bc9201d6f88c8e4863b1ca1c7a58edcfe5d3a458e77d15
SHA512b8d0f3cac10958600ae052272198f297ce0ffacc6ecf23ddf4ba1a6ffed22cd57c196f4599d039ea4fbf45cfda1d07f8ec1e27df1be6020cef9e3b2aca9a4e26
-
Filesize
8KB
MD58e7a3977f3080a08fce3ff827a69499e
SHA1589e8551ae5d0c4ceae780ef30760687e0b138d6
SHA256ad91e4b5fe78246b0a6c1c458d98545d6343fd8d94020ec30a45f7fc51d1f4b9
SHA512c72c88fe88377e76847b1abc5179dfb2da1f2e19a10563247cc9a39552d72ce59d9a5921efb95ad48503bc9cda06f5feaeaec7de8394c5e9cbecce6e04cb3758
-
Filesize
8KB
MD5739b3fe16f15a3329d4312630c391006
SHA15ed726f5657044bd5490a100308f498301c7110f
SHA256c03346aec60ad3494c6e233142bd5ca1af265ca7c44f6b2093bb9fd25b527686
SHA512fc86f7186c9bb9a9e22940616e57e95524c52bb0893f1aabbc869081ec11eeaa904d751d21b45d01f2eacc0021f5d8636c650362a030cdae4cac1bc476975a8e