Analysis
-
max time kernel
118s -
max time network
134s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
26-07-2024 22:05
Static task
static1
Behavioral task
behavioral1
Sample
5934660afc7f754f747cb29d37ad08c5e508954a10a31f8bca31cdd891e22909.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
5934660afc7f754f747cb29d37ad08c5e508954a10a31f8bca31cdd891e22909.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
5934660afc7f754f747cb29d37ad08c5e508954a10a31f8bca31cdd891e22909.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
5934660afc7f754f747cb29d37ad08c5e508954a10a31f8bca31cdd891e22909.apk
-
Size
2.8MB
-
MD5
c282b2f6ef53a8e7789c36d40d3efcb9
-
SHA1
e36a106a9fef9ceef26744cbf1a9ffb897726b23
-
SHA256
5934660afc7f754f747cb29d37ad08c5e508954a10a31f8bca31cdd891e22909
-
SHA512
03be600f9d1f7079bdf2c3ef8635c85f604e38544f84d48425cbfc7639adcae300709b7826fc7f4ffdfb946eab640a4a562a1f90ac651f214025d6179d415a39
-
SSDEEP
49152:hPuv/8BT9nFL4ZjNVir5tV6LOHopToTQvbtht1W8FslW44wAyLtk1nl/gS3y1G:eKHEMVCaHiTNv10839wRLt+Ry1G
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
c0mm.mark.s4rk4r.indianb5nkdescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener c0mm.mark.s4rk4r.indianb5nk -
Checks the presence of a debugger
-
Checks CPU information 2 TTPs 1 IoCs
Processes:
c0mm.mark.s4rk4r.indianb5nkdescription ioc process File opened for read /proc/cpuinfo c0mm.mark.s4rk4r.indianb5nk -
Checks memory information 2 TTPs 1 IoCs
Processes:
c0mm.mark.s4rk4r.indianb5nkdescription ioc process File opened for read /proc/meminfo c0mm.mark.s4rk4r.indianb5nk
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8B
MD58fcff82ca494a0d52b89d1f289444bbb
SHA1f3347e78b565e30c64365906aa1dec79ea4da70c
SHA256e022224a851b0c48897b7a2d6ad6a6f099d2235cbd9004e5789a0f4735081ed0
SHA512c571f9e217db754a5af8636dd3c5230b184bc1e1d8bad49cbdc263ac6ca2f9e263a5910c9058dcee489026974669bf4c7ed02aea9fee1cfba6dcaf2950abe2ac
-
Filesize
2KB
MD50a41cb65e9953a7a04c187494c978ced
SHA1b4890d9eab18ed3599409b90ba8f0222e187df49
SHA256c4c5042c5fb312388cae7cd63f53a2c95f2c1272c38d4afe325e5a2e7db5e8a0
SHA512e35007b5c112acdc884199f7f81999f85373fa172fa3eab608e0359fc9531deb27221a0d25b8c8873fabd6369d1e0f83cd2273c935b5735d4e4e3bc6599d80ef