Analysis
-
max time kernel
271s -
max time network
334s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
08-07-2024 14:59
Behavioral task
behavioral1
Sample
app-release.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral2
Sample
app-release.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral3
Sample
app-release.apk
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
app-release.apk
Resource
android-x86-arm-20240624-en
General
-
Target
app-release.apk
-
Size
425KB
-
MD5
4e07a109b35aebf233bfa1a9a2404e98
-
SHA1
2f1b6cbc555a0c03f1b05bdf16235f212f396944
-
SHA256
84f5c919d41a608532a483935d1fef5405f00d3566467d879f6f639d7ffeeffa
-
SHA512
bd5ed79cfe7ea3e7dbcaa0a9f6ff16a53de06e081f1b10a8501a28bf162c64fdfb364b8a991bf04488d102b34958fe0e593a03fdff43e349806b9ca945dbb78e
-
SSDEEP
6144:HI84XSnAewwzIBK9u4zeRC49bwa40sgZ+0hUpE+P9sCfJKZMTagJKrANsS+:o84X+fwmIBWz0C6lsgYHpE+PxfJpOgGv
Malware Config
Signatures
-
pid Process 4249 com.remote.app -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.remote.app -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.remote.app -
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.remote.app
Processes
-
com.remote.app1⤵
- Removes its main activity from the application launcher
- Obtains sensitive information copied to the device clipboard
- Makes use of the framework's foreground persistence service
- Requests accessing notifications (often used to intercept notifications before users become aware).
PID:4249