Analysis
-
max time kernel
142s -
max time network
173s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
26/06/2024, 15:25
Behavioral task
behavioral1
Sample
b6d18262f5e296cf9c5a8595d0d7c619.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
b6d18262f5e296cf9c5a8595d0d7c619.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
b6d18262f5e296cf9c5a8595d0d7c619.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
b6d18262f5e296cf9c5a8595d0d7c619.apk
-
Size
5.3MB
-
MD5
b6d18262f5e296cf9c5a8595d0d7c619
-
SHA1
e09d7657ac3bc28334c1e13e7d85e79fc8cc3b5f
-
SHA256
c2b6bb2e7b6732ba753f3d17ec71adf1f06c9d4cea65e4debc312bf0163d68b6
-
SHA512
02b33fea324694b38149abb4881e56b8221dc40d2356a75aa37d1f5515a0196fe681d275d7635e08ee5d6d8fa458e8a286dceaceb878112ed3db4b7fda4728a8
-
SSDEEP
98304:vX6vH0fpdsCl039pnVVuzpVMAPHS8rf/O+T1LUXk2fWgyn9RR2QzHPVoTwr5xpif:CvH0fpstpnVMVMAPHZhpLwk2fvK24Npi
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.example.shineinterview -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.example.shineinterview -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.example.shineinterview -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.example.shineinterview -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.example.shineinterview
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24B
MD59dab5d6336405559631363c0ff3f29cf
SHA1e8ce951255dd9bde2893247408464019d9857dcc
SHA2561f69566700a79acbaea1f0d30d028e523a6d12656046b8b7790ff7dc92214a81
SHA5125b5d13f1f45d6005505c965f31e219f22b1195927a85f9adac34e9a14c8f2a7cabfaee5b2142d855be2752bffc5cd4849596dffee9cd771d6412091c5a707aac
-
Filesize
8B
MD5604f7090ae1720f1887a1de0e59fa453
SHA17ce7d3f4464e6fa31d1bd8d3b3da3faecb7c7394
SHA25681983fe0358174281137393992d52cf142ee9102bc5a24f01a82366be369f94d
SHA512752da3c37edb7a5e9c2b3576cc3a9cfb174a28b84831cd581cfe36bd82b770088cc81513c6b4a47d405418e365c034cf2190997c86dd017e21b3d3b66536f46d
-
Filesize
1KB
MD5a9c5111aad72022a092dcf2436762c8d
SHA126a467b78bc11a467f4606a31e6b3fc2ea72f0cb
SHA256dc7cb49f8558b6696e2d2a8bf432ae36735e2aaebc0697f3745d97edb6e42a76
SHA512d86a5a4b4d30f148b6c115d7ff192e796a91a228a8f9314fca355a558feaff343eb55bd5265cf543ab61f0aba5d0352fc9d6ff2d38aca1592075855167919d33
-
Filesize
3KB
MD5742a039a06507f7685a3421a19d81d42
SHA1087a058f3cee479ae7ef9a36177303954e6f6e0d
SHA2566f2262349a3a75f8225a814830d8a3833bc93f2c82f9679621b75a12bde47e7f
SHA5120799b2074e2ac13a04e952cfca1276aa486f9efbf2ebe362970a1acd95ad87b339864aaee19cfd25090600a5962eaee3034cb295def32f73352bd00cc408c63a