Analysis
-
max time kernel
1032s -
max time network
1082s -
platform
android_x64 -
resource
android-33-x64-arm64-20240603-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240603-enlocale:en-usos:android-13-x64system -
submitted
09-06-2024 15:59
Static task
static1
Behavioral task
behavioral1
Sample
Hamster Cоmbot Bывод.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
Hamster Cоmbot Bывод.apk
Resource
android-33-x64-arm64-20240603-en
Behavioral task
behavioral3
Sample
Hamster Cоmbot Bывод.apk
Resource
android-x86-arm-20240603-en
General
-
Target
Hamster Cоmbot Bывод.apk
-
Size
7.4MB
-
MD5
43cd0d0837b2cf2371e93e4340614562
-
SHA1
db8cd87819a91f311f22a78e1e4099486768099d
-
SHA256
608bccf44f236542d708efc9e8d81372bb1a941969f267b315772acd370d2b06
-
SHA512
7e5356ef27b70b99a872b3c5cf8e21358971c0c85c34c7fbab6a8a20a70a5859a34dc8c651e274fd3a13bcb3af6f7adfc2269b108f11bbb25eb4257ac5f9a0f9
-
SSDEEP
196608:xwzajoJT+62TZF8SoGwsX7LwwYwwxfn8/XezdJsy7BwHxz5:4aKfsf1oRjzqXeJSyK
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.example.applicationdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.example.application -
Checks memory information 2 TTPs 1 IoCs
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.example.application/files/profileInstalledFilesize
24B
MD54eee2132a511913a91bc3570b084e6f7
SHA1d565e5e044335019c604dcc14f9ca78db121c7c5
SHA2562f91dbb8f7a2348d8f71dfe5059e355b764953505818ade41250a0bb8fe1e79e
SHA5128f22ed692c1b3165506aad207120cb8d8ac654723721dac7a9093b60a760671d6f607a413076e8f1abd8ffdb8f852d310a3cd7ee4fcb6c2c7f559b363de0cb86
-
/data/data/com.example.application/files/profileinstaller_profileWrittenFor_lastUpdateTime.datFilesize
8B
MD51fa1d0505a128cee7236ef686a448579
SHA1e67eaadcf33d1d00e04cd1bd4e7688253b064bcd
SHA2569a07efd72d6d36d993506f8e9509af558f535ae3380cd1a4811656169eb4c852
SHA5125e26218d2777df44c064488bdaf523efd31b2a4da81773d101cb38eb101c8181d488b478a007cf061579d94dc37f244dd8a7ed239290ee4ff4d11f1adb4a40f7
-
/data/misc/profiles/cur/0/com.example.application/primary.profFilesize
5KB
MD586800d48a00de0a211011e9356cd7371
SHA1aaba899af40fc1aba33cbdf52d4f8e2a0b9dcd71
SHA2564c3f5ad9ca5623b2ab5f655be042f18fb156101295381757fa76d524143a25f5
SHA51271c6ecf46af762b87f05c5b2253711b641f62c0381623364d98181171566b7c879eec22884af047f1d4563de2a7ca78d7a073d1ab5625bb8c171f4941b26edd7
-
/data/misc/profiles/cur/0/com.example.application/primary.profFilesize
2KB
MD51dbcd3ae623f136ba82818fa2d47743b
SHA1db8503f6e1546242cd00b3c16705f2b4efa40f83
SHA25635da73f888cb559111c189078f3e43a29850b79f74a9eee6e05b8214d2675965
SHA512395c20398de2606f0b40e9eccdc731ba1fbe5eb3bd7ab26b96cd79c25aeeb793a90795c11c9be689d4b9a6b2f71c1b32df85072c0991cf5d31f47216319985ac