Analysis
-
max time kernel
317s -
max time network
1229s -
platform
android_x64 -
resource
android-x64-20240603-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240603-enlocale:en-usos:android-10-x64system -
submitted
09-06-2024 15:45
Static task
static1
Behavioral task
behavioral1
Sample
Hamster Cоmbot Bывод.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral2
Sample
Hamster Cоmbot Bывод.apk
Resource
android-x64-arm64-20240603-en
Behavioral task
behavioral3
Sample
Hamster Cоmbot Bывод.apk
Resource
android-33-x64-arm64-20240603-en
Behavioral task
behavioral4
Sample
Hamster Cоmbot Bывод.apk
Resource
android-x86-arm-20240603-en
General
-
Target
Hamster Cоmbot Bывод.apk
-
Size
7.4MB
-
MD5
43cd0d0837b2cf2371e93e4340614562
-
SHA1
db8cd87819a91f311f22a78e1e4099486768099d
-
SHA256
608bccf44f236542d708efc9e8d81372bb1a941969f267b315772acd370d2b06
-
SHA512
7e5356ef27b70b99a872b3c5cf8e21358971c0c85c34c7fbab6a8a20a70a5859a34dc8c651e274fd3a13bcb3af6f7adfc2269b108f11bbb25eb4257ac5f9a0f9
-
SSDEEP
196608:xwzajoJT+62TZF8SoGwsX7LwwYwwxfn8/XezdJsy7BwHxz5:4aKfsf1oRjzqXeJSyK
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.example.applicationdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.example.application -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.example.applicationdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.example.application -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.example.applicationdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.example.application -
Checks memory information 2 TTPs 1 IoCs
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.example.application/files/profileInstalledFilesize
24B
MD51704524d9b30049b972ebeca4f19f82e
SHA10224a68fdd2aa8eae59ff1c32cd4545ec4c61377
SHA25663b8f8f0998a54659ee46973f768f86f9a9e0a69bd657dc8abd3e71f965e48f1
SHA512ffbbd20c6ef6b942f6dc1509e5564525be82fd76231a8cee5724b7daeb4c45aad55fdf422883960937324e57a1c768e694f0de2d2749df4cc5acccce982f3de2
-
/data/data/com.example.application/files/profileinstaller_profileWrittenFor_lastUpdateTime.datFilesize
8B
MD580dacaec4af43f8c6c474f9ffe29cadf
SHA1ad8fde2fa9e7041bce6ed4f770a355cb39590f65
SHA256c3688996ce25fd0c81d6dbcfed3a4ea5aa8114e55f631af0035484862e494f4f
SHA5121f41d8670d86eb730127d8dd97dbf20375505e1cf07ad35be7d26c743e89a3f3a09596fc7f36fd5a1b6f8401358255d7e1fe21ffe7faff5d28cfb738ad5ec8ce
-
/data/misc/profiles/cur/0/com.example.application/primary.profFilesize
5KB
MD5b6d3ca5f8b1bea3f243673abdcbc25f4
SHA1917a67c3b5fd9814adc01e81c59ed08c70db70ac
SHA2561eadd2d3de1286832ab2ff6ee7eaba4fc116b53981008593219e9afe543cc9df
SHA51203bbd5bff2f967445e1f62da8570063f2aae822c3f0bfc67a42d7d0afc893ba5394e3d5d525dcd7c4569fe0f0e9a904b0fe5044c138a2427c46879bd7ae6a4e7
-
/data/misc/profiles/cur/0/com.example.application/primary.profFilesize
2KB
MD5c99ee4d91c8b0fad10f084249f01241b
SHA1478a3461519e1aa10d0225ff82b4edc79b74e747
SHA256e1e1d4b0261babdff5f64c6a3a3e935224f733badcd50339c8b36351a118893e
SHA5126e1e4449ec73c993885960a12d8a7994fec67bb804c0faca3081626c5c14fdb5650c320249ccbb988897c2b1288c95db8e56e7ab6b138bda750aba8a53a4d768