Analysis
-
max time kernel
50s -
max time network
134s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
11/07/2024, 22:15
Static task
static1
Behavioral task
behavioral1
Sample
Virtual Rosetoy_1_1.0.apk
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral2
Sample
Virtual Rosetoy_1_1.0.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
Virtual Rosetoy_1_1.0.apk
-
Size
3.4MB
-
MD5
60d4d71a4820f7712af3347721fac4c7
-
SHA1
50d65acc84bad110df9d75a443b1f599151e8301
-
SHA256
ebd5538698a4731e4ef080398d75b2a2d91a9381f9f1129e62c9eee0791551cb
-
SHA512
e35d7d5490acf2ffa0882ce4953b2f6e89b62b370d9e36c90d81760fe242e1998ce7294aadbc9e17fde7096e25468fbd306afd3f72d71c81eafb1bd15db46570
-
SSDEEP
49152:7Dd9oqzN3al/eTnwCoG5Seu7heIdIPwiB1yWxqBWYpWogZk7i0rOELNl:7DvoqhqlGTnwvGsAId67oX7i0rOAz
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.goyal.website2apk -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.goyal.website2apk -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.goyal.website2apk