Analysis
-
max time kernel
177s -
max time network
189s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
30/06/2024, 22:05
Static task
static1
Behavioral task
behavioral1
Sample
95fdf2f2a297b922bba55cca41eca60164fb56c3a26306356a694e62c1471c7e.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
95fdf2f2a297b922bba55cca41eca60164fb56c3a26306356a694e62c1471c7e.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
95fdf2f2a297b922bba55cca41eca60164fb56c3a26306356a694e62c1471c7e.apk
-
Size
2.9MB
-
MD5
e949e68849b9c4f69b982ebffa5cc1aa
-
SHA1
7181d9fca9a512a05a453ae8f16cff5fdfb8a495
-
SHA256
95fdf2f2a297b922bba55cca41eca60164fb56c3a26306356a694e62c1471c7e
-
SHA512
a39e8f1f1d634e93300d5e27497b05632f6a34ee92991af5a50bfcc47ecc653c700807dc9a93a6679c3bbe0b8ead4496ead6dd524b92084771e2ea7a6aaecbf0
-
SSDEEP
49152:HTgyJ3NLOZvZGaJkSvmRQtrXT6SRey9PGRoZe3Ed7h7dTt9we:zZPLchGMA+XmSxYUn7dTtie
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.indusind.mobile -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.indusind.mobile -
Checks the presence of a debugger
-
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.indusind.mobile -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.indusind.mobile -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.indusind.mobile
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24B
MD5e7a561b92f1c89fe017254fca1e6f159
SHA1dea4d8c0cb3af9a246ad6cbd497e318b9f74126e
SHA2568cd7e4923764321ab1319dcd8982d3fc8099248b26b650b98bb3fbac69946265
SHA5123838c0d54d23bec9beb25172b1e2195359802172f4120cda16bcb0221a41f58df86592d592b86037a3fc65057ff00da616c45b076d69968c2e5133130618df19
-
/data/data/com.indusind.mobile/Û¦Û–Û«/Û¦Û–Û«/Û¦Û–Û«/Û¦Û–Û«/Û¦Û–Û«/Û¦Û–Û«/Û¦Û–Û«/Û¦Û–Û«/Û¦Û–Û«/Û¦Û–Û«
Filesize925KB
MD58fcdc23ab7b6b788c00ea41bf354421e
SHA13658c4ffd3404ed69107dac702041decdccab3cf
SHA25627cacab716fb9a4ae09b554a351e67dd1df9ea7328d5e6a05b5c9bd10650e888
SHA5120960216f11b7ba5b1aeed0ccd3f1180265c08a527ea9ab24aa4b26ac804b539b0608d7794fb05d276c956d76c71df7f2f492c3e46ddaf9bae184f167ae1d94fc
-
/data/data/com.indusind.mobile/Û¦Û–Û«/Û¦Û–Û«/Û¦Û–Û«/Û¦Û–Û«/Û¦Û–Û«/Û¦Û–Û«/Û¦Û–Û«/Û¦Û–Û«/Û¦Û–Û«/Û¦Û–Û«.
Filesize8B
MD50801ec1d396cd386726cb13fee607a35
SHA1bd87b741101272cd9a11e7b2cf4d1dd4792e9356
SHA256352773f612183cc7984f3b27fc570591c21b3c4d3df8037626c2810216177272
SHA51290e2a10ad46b6a82fd7d486d03b564f9c5697b7b0cbbebb54defb04a31d2f57d3047c9a86c9d9f48813a21f205989fbd5a684cf9a2b9857c53ddb00df9e62592