Analysis
-
max time kernel
1828s -
max time network
1833s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
03-07-2024 01:05
Static task
static1
Behavioral task
behavioral1
Sample
detiktoto.apk
Resource
android-33-x64-arm64-20240624-en
android-13-x64
3 signatures
1800 seconds
General
-
Target
detiktoto.apk
-
Size
82KB
-
MD5
942ced1ebbc554158fa3423c3d50d7ee
-
SHA1
574423a6816df2d1095518f16dd553f8c7100de1
-
SHA256
b19650f62ef7dd2f0a7f609270bfb9800119ec24b80df4a7f01da0c45070d914
-
SHA512
2181640f459c2ceea3d2d7593651807f9c4e50879d142e72c3325130edda4d3b55b17fbda3a25c9ca1536d2b56b999c8cba2c73071f47552d68ff0e1b9f84d3a
-
SSDEEP
1536:BHmHfJbUU4lmqjItxfCcIQ8Be4+VCGItvGWE4aB:NAYmIIt98jBG4LeWEb
Score
7/10
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.goyal.detiktoto -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.goyal.detiktoto -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.goyal.detiktoto