Analysis
-
max time kernel
46s -
max time network
62s -
platform
android_x64 -
resource
android-33-x64-arm64-20240611.1-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240611.1-enlocale:en-usos:android-13-x64system -
submitted
17-06-2024 22:46
Static task
static1
Behavioral task
behavioral1
Sample
app1.apk
Resource
android-33-x64-arm64-20240611.1-en
General
-
Target
app1.apk
-
Size
62.7MB
-
MD5
e180493d37441a66da30b8cdb91827e4
-
SHA1
f8a67fc9ab9cd11060b523213edb2375d89e5636
-
SHA256
eafa989bd8ecb790e2da622af152ea6138ce314d16cca7b96ba3b09f96b3c2b4
-
SHA512
2e16c42fe23ff56ca289e5f1b1320b7aed5097a62aacb7f623f76df52a04180fb558d58d32f51f761b573e8113e79fc2e4528d32d93bb687a94e55785c0b39de
-
SSDEEP
786432:sB7Fy+Rq+uwvxu4OfsTEevO5VkRvd9pJaFuUlA7k8NRNFCdURctn3w51WZnjkkV0:shFaKpO0TEevUkB3jhI+cR3wIj11v2
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.milo.quest1ioc pid process /system_ext/framework/androidx.window.extensions.jar 4389 com.milo.quest1 /system_ext/framework/androidx.window.extensions.jar 4389 com.milo.quest1 /system_ext/framework/androidx.window.sidecar.jar 4389 com.milo.quest1 /system_ext/framework/androidx.window.sidecar.jar 4389 com.milo.quest1 -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.milo.quest1description ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.milo.quest1 -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
com.milo.quest1description ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.milo.quest1 -
Reads information about phone network operator. 1 TTPs
-
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.milo.quest1description ioc process File opened for read /proc/cpuinfo com.milo.quest1 -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.milo.quest1description ioc process File opened for read /proc/meminfo com.milo.quest1
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86B
MD52a60193850443542eac79e42d4c58d54
SHA1ee42ee1fccd7e473206eb45c2f13860e144aee57
SHA2564a69bc31122b1669266308f86628d568c331b4623505f1afd8f3fe8afc43b4b6
SHA512d5791c5f327c6a2325da3bae4efee23bb4a1ec0b32b13465b4f37638619322c777cebf1a07e3e724c71e999e192a03dc92a5b51209d4012080e7154a3e663894
-
Filesize
99B
MD5b443f2687e3a602dd614c4659028f66c
SHA1c88b7d83563f0f7618f20481adef3b779189c4e5
SHA256fe96e637bffa6d238e456f2bb1c21e35562206948ce807b23d9d89ecf95424be
SHA512903562ff046b0839c3758e4cd806432d84dc8b4061df9f88fe46d10728ea05618c95dcbafc439354220db529d56a93cac48b435303fcad27bf335da9bc42435e
-
Filesize
98B
MD58090a1922b009687dfae3481417a9b49
SHA1698f8bf5c1ca210941c37a1b742d75eefdb766db
SHA256d0f9a24bb925081e9fc84ba47a6600514820647ca6722a22b6691c0937a88406
SHA51270d6aba6cc852bb74479856595b034f19a071d41198c7c6893eb13c8595537e27bf763a8878c91cf0f3fbe8873c8d2d1316898bedff356c34c0092693ebb73e3
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
123KB
MD53056e1bdb7d4e19789d0319eff484bd0
SHA16791ae47aa9466fe0bca27ad6643f846853bbee4
SHA2568e6331a07c9f2ac139214c527dcaff2c82d126bbe7bd3420cdc36d6a8c9204b0
SHA512c790980fd68d9f89e32743bc28846807d5e5947c555f494de47714dec5cbd0c08d81c3260fa463759d1b17a953af3c44ec30b14fb08bf6b29db3837346c9f658
-
Filesize
25KB
MD529469324e59dfcc052f24b5af4e7b2c4
SHA110c1e17ac6f598037bb51baa07945663645de4eb
SHA2569195dc6a1c75a841384050240dfc972e48178964993fba6619788625f4b40d1a
SHA5125e27c2b1431369a248298f2f749136a575005584f9999f2a4c204a0c47adce2e33c8df9f058bdafa1bde1c99e46d175560cedfcddcd8581718ed1d9973c37cc2