Analysis

  • max time kernel
    5s
  • max time network
    132s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240611.1-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240611.1-enlocale:en-usos:android-11-x64system
  • submitted
    15-06-2024 01:08

General

  • Target

    0d2521fe4a3276db3b4046c4c75f37aa1b7a011cde53a129c7c2a0e70e5a2470.apk

  • Size

    3.3MB

  • MD5

    79b00e3e8645541c5ac4fc43f13d21c7

  • SHA1

    b50824a56fb4c089e4478b0f9faef94564fd8827

  • SHA256

    0d2521fe4a3276db3b4046c4c75f37aa1b7a011cde53a129c7c2a0e70e5a2470

  • SHA512

    1d29240a9baa248d03e1463235d7285653d25856631c3a09841acbc1d0d0d54c57f6dcd67d214c3fe019d904851b0297dacb274b8efb9ddf47349b6da7c6a806

  • SSDEEP

    98304:aEvOX6y4Rwz0PT7nDQvauCfopjX8bsp07cz:dOz42z0Pj6mAxX8wuw

Malware Config

Signatures

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Checks the presence of a debugger
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.iuuytoonline.android
    1⤵
    • Obtains sensitive information copied to the device clipboard
    • Checks CPU information
    • Checks memory information
    PID:4557

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads