Analysis
-
max time kernel
61s -
max time network
167s -
platform
android_x64 -
resource
android-x64-20240603-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240603-enlocale:en-usos:android-10-x64system -
submitted
08-06-2024 17:23
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_1c7281343ebeba4487305044fafee2bb.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
VirusShare_1c7281343ebeba4487305044fafee2bb.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral3
Sample
VirusShare_1c7281343ebeba4487305044fafee2bb.apk
Resource
android-x64-arm64-20240603-en
General
-
Target
VirusShare_1c7281343ebeba4487305044fafee2bb.apk
-
Size
37KB
-
MD5
1c7281343ebeba4487305044fafee2bb
-
SHA1
1020aaf3c82d6b4470394cdfed85806f732d1203
-
SHA256
ee02d277152183f6b4df1b846945c2c4d8ce6f15d5eadedbd6bd89542e48ed58
-
SHA512
c97deda56f7939b5796abfedc473ff1c74bab10ba676c4138f59097b406e802d46096cb97ba17f37c34c130c0958500e05eb742276d743cff3eb17c271246c75
-
SSDEEP
768:iJ2GYulSKRhF/XOsyhMtEzzHHiNmZGwSdFkM82E6DqYPKFF/z2R:iJ26SKRjXO6ijHKmZKkM8X/Ys/a
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Reads the content of the call log. 1 TTPs 1 IoCs
Processes:
de.omniscient.superciliousnessdescription ioc process URI accessed for read content://call_log/calls de.omniscient.superciliousness -
Acquires the wake lock 1 IoCs
Processes:
de.omniscient.superciliousnessdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock de.omniscient.superciliousness -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
de.omniscient.superciliousnessdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground de.omniscient.superciliousness -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
de.omniscient.superciliousnessdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone de.omniscient.superciliousness -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
de.omniscient.superciliousnessdescription ioc process Framework service call android.app.IActivityManager.registerReceiver de.omniscient.superciliousness -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
de.omniscient.superciliousnessdescription ioc process Framework API call javax.crypto.Cipher.doFinal de.omniscient.superciliousness -
Checks CPU information 2 TTPs 1 IoCs
-
Checks memory information 2 TTPs 1 IoCs
Processes
-
de.omniscient.superciliousness1⤵
- Obtains sensitive information copied to the device clipboard
- Reads the content of the call log.
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information