Analysis

  • max time kernel
    59s
  • max time network
    68s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240611.1-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240611.1-enlocale:en-usos:android-11-x64system
  • submitted
    12-06-2024 19:55

General

  • Target

    gey.apk

  • Size

    2.6MB

  • MD5

    aa82c709f5863c5e167d419d45e11670

  • SHA1

    b3e81da648b43c581f7374e1a54a20b9c6831e13

  • SHA256

    2fa3229fe01e0615861cd8f4d03aa64ed6640b4c9f84dc395e25c91002c07a12

  • SHA512

    820cbf2a667b82e7826685e173a4c134534c7d4b69a477960d7796e6d9f2c66e57a1eb8dc8daee33491847d65f6fbb68a0daba8bcc4c6fdfcfeca999ccc0da34

  • SSDEEP

    49152:AA+VHmypbx2Pc4tdrqok6vFIRjTg3RLsM1CjwBoAyC9a0W07zPNywYV7KHe:AAEGylmtdr93vFmvgZsHcbyhSzah

Malware Config

Signatures

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.if831c2cf3041abe0
    1⤵
    • Obtains sensitive information copied to the device clipboard
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4440

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads