Analysis
-
max time kernel
23s -
max time network
147s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
26-07-2024 22:05
Static task
static1
Behavioral task
behavioral1
Sample
5934660afc7f754f747cb29d37ad08c5e508954a10a31f8bca31cdd891e22909.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
5934660afc7f754f747cb29d37ad08c5e508954a10a31f8bca31cdd891e22909.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
5934660afc7f754f747cb29d37ad08c5e508954a10a31f8bca31cdd891e22909.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
5934660afc7f754f747cb29d37ad08c5e508954a10a31f8bca31cdd891e22909.apk
-
Size
2.8MB
-
MD5
c282b2f6ef53a8e7789c36d40d3efcb9
-
SHA1
e36a106a9fef9ceef26744cbf1a9ffb897726b23
-
SHA256
5934660afc7f754f747cb29d37ad08c5e508954a10a31f8bca31cdd891e22909
-
SHA512
03be600f9d1f7079bdf2c3ef8635c85f604e38544f84d48425cbfc7639adcae300709b7826fc7f4ffdfb946eab640a4a562a1f90ac651f214025d6179d415a39
-
SSDEEP
49152:hPuv/8BT9nFL4ZjNVir5tV6LOHopToTQvbtht1W8FslW44wAyLtk1nl/gS3y1G:eKHEMVCaHiTNv10839wRLt+Ry1G
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
c0mm.mark.s4rk4r.indianb5nkdescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener c0mm.mark.s4rk4r.indianb5nk -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
c0mm.mark.s4rk4r.indianb5nkdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone c0mm.mark.s4rk4r.indianb5nk -
Checks the presence of a debugger
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
c0mm.mark.s4rk4r.indianb5nkdescription ioc process Framework service call android.app.IActivityManager.registerReceiver c0mm.mark.s4rk4r.indianb5nk -
Checks CPU information 2 TTPs 1 IoCs
Processes:
c0mm.mark.s4rk4r.indianb5nkdescription ioc process File opened for read /proc/cpuinfo c0mm.mark.s4rk4r.indianb5nk -
Checks memory information 2 TTPs 1 IoCs
Processes:
c0mm.mark.s4rk4r.indianb5nkdescription ioc process File opened for read /proc/meminfo c0mm.mark.s4rk4r.indianb5nk
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24B
MD5b52f47e11a6d66e610681eff09884bcb
SHA1f058ba3f3866fd0aad6343dff6de5c04e93cfaa0
SHA256f810b8d5600455e9ef45ea6f27c70f3b3141dc8f78d6afed7dcf811ba64bab25
SHA512db639e102e62e33441b6e678defbd1f6c8cc855bd96ab9d89cd933879191626ff31827928d6a84d974f781296cf948186e831df59a4762b888a3bab444c2e93c
-
Filesize
8B
MD573ba602c254c8012920fda9b2eaded9a
SHA1d4505d762abee58bb6e0f0991a8b5339330e1b19
SHA2565c29b60cc6f763049e050a86731066210b80ab847f4e9d9c8956fc2336eb7f5c
SHA512f01673c92ed475a718a6361cceea31cf349fafcf97469ccf1612906b897be7f2526b197bc6e45198db7f3c0f22b3c732b0f3781f46afcb8b18bf08d5a84ac23c
-
Filesize
2KB
MD50a41cb65e9953a7a04c187494c978ced
SHA1b4890d9eab18ed3599409b90ba8f0222e187df49
SHA256c4c5042c5fb312388cae7cd63f53a2c95f2c1272c38d4afe325e5a2e7db5e8a0
SHA512e35007b5c112acdc884199f7f81999f85373fa172fa3eab608e0359fc9531deb27221a0d25b8c8873fabd6369d1e0f83cd2273c935b5735d4e4e3bc6599d80ef