Analysis
-
max time kernel
179s -
max time network
156s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
25/07/2024, 13:38
Static task
static1
Behavioral task
behavioral1
Sample
1c515aede5486f85bc034df1dcb32739.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
1c515aede5486f85bc034df1dcb32739.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
1c515aede5486f85bc034df1dcb32739.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
1c515aede5486f85bc034df1dcb32739.apk
-
Size
3.1MB
-
MD5
1c515aede5486f85bc034df1dcb32739
-
SHA1
42ac8f0d3682151e82fa013771ed474eedc1a7d9
-
SHA256
dd9bffae67203f1b17939b4956dfe7197552cef026e6dffbb2ef321c93145b94
-
SHA512
65527360ede1a8f337828e159392421ca3c9fe7af8ee5f5cdbc01682d396329695b7e108745540d9c272c6854dab5272bffedf58cce9c2095be91bef47932f06
-
SSDEEP
98304:L9OiYJpX4o5Ee5p+jZXbEj0L9WReo/KryO3j:8pX/Ee5AjZgO9WW3j
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.gurujifinder.mjpro -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.gurujifinder.mjpro -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.gurujifinder.mjpro -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.gurujifinder.mjpro -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.gurujifinder.mjpro
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24B
MD5f3a4b5c281ed5c88b4ff743a5fc2de1b
SHA1b09b3ddf3a3cfb36bea6184911a6a713f70cfd3f
SHA256a80efb2aba611b78d427e89a6a57e1eb428d43248a62ce638f2912a59f3cc5cb
SHA51260fcf82b4eb9eacceb260d89a98fe617aa9a3b5309763a2bc78ae74c711d46b84c02c70b999b0a686fdb9d9b820ec5bd20877559ea58a51b37f9336e85811c22
-
Filesize
8B
MD57ea69ad244eceb73dab8cbbc6c29ff4e
SHA1029dc072c1924ae2669944673389ab217916d20a
SHA2567d9b1021b5db10f3574f725addbb5ea6bb5bfe5e26b84738f129dac57f15cfda
SHA512b0c28346c10f9a6ec075d9d443c17e295f0aa1147476bd4946cf0d3553489e480db0040c8515486be8ae616c17b2dfee6270a9da79b892536e2c07b6c50ff920
-
Filesize
1KB
MD5b92c3bb69f3789cbfea56a0f65c07285
SHA1d0680f9916c6187cca0e99637890c2411863fd54
SHA256977ffeafdc65035be298161518da66cbe18247db31a30e9e15204bcf26250e68
SHA5124b713c15204fbc78c63490f7591ffbeb1a666de4f1a58d89d19b4b15fb111a27306122643a1ea17d1e7fae2908915f21638132dad5c18efa11401eae8cd2aa75
-
Filesize
2KB
MD5d75d7f96d4a6e63becc260d7c871a3d3
SHA1ee08fe8f1b10a116e54a6ccb1562c426762339ac
SHA256d7fe0437c22847426fb9e258b931dc0d2a88e0313da0c657ddb96abca8495d89
SHA512d6333ddb93ac5af33da02454a4469024c84322de9edfd16e6f77ccc5df3b36ad96a9e0c7ee5aee1f1e89a30f7d5f79ee9fa9685956f38be3b2e433989b795f1e