Analysis

  • max time kernel
    74s
  • max time network
    138s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240611.1-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240611.1-enlocale:en-usos:android-11-x64system
  • submitted
    12-06-2024 13:57

General

  • Target

    2b20e905a80fba0299241b5f149f2f5228bef9801344aae0a34ffd7d259440dd.apk

  • Size

    1.6MB

  • MD5

    d494ee0cf71530c4722c198d509b2c09

  • SHA1

    9cbffb003be939ebc82e13204c0603c1be193ec1

  • SHA256

    2b20e905a80fba0299241b5f149f2f5228bef9801344aae0a34ffd7d259440dd

  • SHA512

    b6a4835b955d7b3fb57a578092ff0680b6622ff8a4c2d8bd6d144d4f3f78e0b7f6ab09df5f1e415629b8bdf7606b6cf9445b1bad6d4c0a0f62329d3623a97ea0

  • SSDEEP

    49152:o4b5MvuBXy9XzP8rmLMepCbagnig8Mzfr+Ez:Rb5MGBXy9XzP8rFepCB1zfr+Ez

Malware Config

Signatures

  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.perl.gql
    1⤵
    • Loads dropped Dex/Jar
    • Obtains sensitive information copied to the device clipboard
    • Checks CPU information
    • Checks memory information
    PID:4713

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /system_ext/framework/androidx.window.sidecar.jar
    Filesize

    12KB

    MD5

    bdf3529e80318eb14e53a5bf3720c10d

    SHA1

    25c9ace4b1af6e80ebb2572345972c56505969ba

    SHA256

    bbc8300dd1e9cd08de8f66560c1ac2c928615b72b51cef9649f88974f586d64b

    SHA512

    48b9c2d01171bb651b9b54826baa51f4add48431a3efd8ceb5f7cc3bcd6f8f37edf47fabb24349dd15b3a02329cd450f90a8d164bf4f8dfae554bf3b35a8a55b