Analysis
-
max time kernel
27s -
max time network
134s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
26/07/2024, 10:59
Static task
static1
Behavioral task
behavioral1
Sample
1bead192882f3709baf86f470a618e0b.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
1bead192882f3709baf86f470a618e0b.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
1bead192882f3709baf86f470a618e0b.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
1bead192882f3709baf86f470a618e0b.apk
-
Size
3.1MB
-
MD5
1bead192882f3709baf86f470a618e0b
-
SHA1
4cd6caea8caf62b51f7beb6cce0583fc5a2ed4d5
-
SHA256
6d857a699953a848baaed47854855acb75d43d3a9a52ea6e209de6d5e4ce9c63
-
SHA512
2fc1aad7a277388ea700993de07e8e3512517d68f6b6a798cb4ba78f5d5480376fe8aeee2640fe94da0d303d0022d4c5982383841665d05f5bb66484e8615a80
-
SSDEEP
98304:anbWPpjP2QX/B0DLpqbA5mYEjSsOgqQqo/KrTH9+:aiR+6/WYbA5m1DOgqQ09+
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.gurujifinder.mjpro -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.gurujifinder.mjpro -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.gurujifinder.mjpro
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8B
MD59c9c7c21c976bb82ba7d151e102b5e80
SHA1c646619daa5a286006d35f2e33671210f5da1b7e
SHA256f4b190d8ce7de3fe223573974ce9ba55463daccb73a51f1b62a9f2cce1e2c616
SHA512b10e97b4401eac43d147e6783a6b6cb02950dc4b4c9d57e364ccbc65b296ace3638f3af9a1d2f6f880c40e537dea6e5daa20950f899dc5dc794a9d9e49eaba97
-
Filesize
1KB
MD5613f157a1d3e94cb3348ff41d9098463
SHA15d3a447d7697140bd0ae69d5ea531df5dcc3f061
SHA25655f885165f4e824f1acb6aa26c803135e54b7a726dcca1676b5390b247401e01
SHA512d729b17f33bad0e5aec6e4c674de3d47119d095a96b2d5fa354933a95cf07a696277c830cb4382598311c42f67e36b66bd9bb2b4871b4aa87a6d8113c1c2a8e4