Analysis
-
max time kernel
151s -
max time network
151s -
platform
android_x64 -
resource
android-x64-20240611.1-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240611.1-enlocale:en-usos:android-10-x64system -
submitted
21/06/2024, 23:53
Static task
static1
Behavioral task
behavioral1
Sample
979cf20eddb35f4dcdf03f4d038356218286fa8e2bdfb301b80de87868ae6ce0.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
979cf20eddb35f4dcdf03f4d038356218286fa8e2bdfb301b80de87868ae6ce0.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
979cf20eddb35f4dcdf03f4d038356218286fa8e2bdfb301b80de87868ae6ce0.apk
Resource
android-x64-arm64-20240611.1-en
General
-
Target
979cf20eddb35f4dcdf03f4d038356218286fa8e2bdfb301b80de87868ae6ce0.apk
-
Size
4.8MB
-
MD5
e60d7e61eec04392ce766eef745c25f3
-
SHA1
b5a07034f2ad2b13c578a3a2a29e1d06bac7662a
-
SHA256
979cf20eddb35f4dcdf03f4d038356218286fa8e2bdfb301b80de87868ae6ce0
-
SHA512
502f40243a663cdacfca3c1813122399a6a30ec644a5d2eb77965c2b109936e6a934c706f2fa449e17c19fe4c27ea2cb74ea456e10d583af896d6df09785ead6
-
SSDEEP
98304:KkjOHHv5FGaGAYT6zefWkHB41gVR39uQ7fEAOSl9AE0wHzW5IZzHHrKYdJh0VVfx:KkmHvHdzeftuiR39u2M6l2Qy5I+VVfx
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 6 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.god.godmod/app_ded/muXd21V0HutmGV4aIRTCxWlD3FBDWAAi.dex 5042 com.god.godmod /data/user/0/com.god.godmod/app_ded/muXd21V0HutmGV4aIRTCxWlD3FBDWAAi.dex 5042 com.god.godmod /data/user/0/com.god.godmod/app_ded/DXRS7mKlfw30e6gaNtbuZQRl3LmYarR1.dex 5042 com.god.godmod /data/user/0/com.god.godmod/app_ded/DXRS7mKlfw30e6gaNtbuZQRl3LmYarR1.dex 5042 com.god.godmod /data/user/0/com.god.godmod/app_ded/6D1QJsM8Ijq2xk3ZS5wBSnDNUf7734AB.dex 5042 com.god.godmod /data/user/0/com.god.godmod/app_ded/6D1QJsM8Ijq2xk3ZS5wBSnDNUf7734AB.dex 5042 com.god.godmod -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.god.godmod -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.god.godmod -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.god.godmod -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.god.godmod -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.god.godmod -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.god.godmod -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.god.godmod
Processes
-
com.god.godmod1⤵
- Loads dropped Dex/Jar
- Obtains sensitive information copied to the device clipboard
- Queries information about active data network
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:5042
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD565c71280dd6f61b8bbbb8112a33873ce
SHA16be5e84353215bdad7672db29211c5b04e444288
SHA2569fa4d60817c616f8328888c7a028f264b6e2463cf9eb2893dd66157b26f621dc
SHA5128ba6f75dc415c69280740777f9518eed1f2a2bfde598c80e5268becb3deacf7cba9f73f34355245228c08664be8dc20fe41047ff721f1a8ce54574270585efdb
-
Filesize
6.3MB
MD5252b342e67c4789302187b034c630bf0
SHA17b9679ce6e617c69dde6463f41734a18d8754b24
SHA25606a3a43eaf097d13bcb8e5e292a7aafc9b01b26f8b4b1893e11a0feb55ea0f61
SHA512ccaa9b09ca99c79f18135391c754c61387a950a5dc7eddd2cc17deca74e937523e7fa9f0d3ccee64327aa009cb21f90fb42e8e517deefd83d23a01178e5d7f05
-
Filesize
5KB
MD52ab8b807ee2323fd26aadb245f297f7c
SHA12dad865756c7f7192d0f61435669cd7ac72b3984
SHA2565984f5fed596c5c2601eb25227ccff6fcb9c323188fa8b69e87aa66a528fd665
SHA5120e577fea3ffd221ba90e1b3ec9e2b8dad4ac7113af20a61f01387aaee7f83cbd5a7c4ca5337e38447c83d936036184f06b420bb27ddee01686505dcd30eaf93b