Analysis
-
max time kernel
46s -
max time network
157s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
26-07-2024 11:04
Static task
static1
Behavioral task
behavioral1
Sample
7acfe7b63643d844cf76f2605ab3254d.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
7acfe7b63643d844cf76f2605ab3254d.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
7acfe7b63643d844cf76f2605ab3254d.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
7acfe7b63643d844cf76f2605ab3254d.apk
-
Size
5.2MB
-
MD5
7acfe7b63643d844cf76f2605ab3254d
-
SHA1
18a739493dee77f01c2f44060fec56347b47eed5
-
SHA256
03d16dd7b6cac3aab315209c81a9c03267a4bc92f8c4971afad80c86f50b3d4c
-
SHA512
243478d49dead1d728cea64a3d39877c464c1c63f27a948ae63683c3c9a2fe536cf3dc2361cb88d6841c3a63dd927c4d51f5c3bd09a4830ed4e60265eaefa44d
-
SSDEEP
98304:tr6MzhUpYTaBz19NDyhD3kLasfj+n/+e5+IBIEJyC4vIEjIL8l1M9pqo/KrTH9E:tr6MAma91fDylBsO/v+I9JkvF+8l1Gpt
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.gurujifinder.mjprodescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.gurujifinder.mjpro -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.gurujifinder.mjprodescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.gurujifinder.mjpro -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.gurujifinder.mjprodescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.gurujifinder.mjpro -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.gurujifinder.mjprodescription ioc process File opened for read /proc/cpuinfo com.gurujifinder.mjpro -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.gurujifinder.mjprodescription ioc process File opened for read /proc/meminfo com.gurujifinder.mjpro
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24B
MD53763c0577b330313a6725006cd4b7638
SHA1e6a12c61220e37134d5ff8f5fba715352382aa13
SHA25625cd90dceb5e4044826b7f75d6e973886e020cace23d54d0d49e0ea09ce72cc3
SHA512a9b310207080f5099e13d96bec2de33f43d29ed1fc55c3d15e7e455f04f7ec40283d04cbdd0bf1dbd9c7cd20eeee3702e2015df2e8afb40f1694d2872d5ac9ee
-
Filesize
8B
MD538d18eac3339beff479feabde8b40195
SHA1f055a9108922a6dd1274dea982f565f7020c843d
SHA256840ccce6b192a5d4ea45f22ef758565fbfcaa7bfcec8d35ea4c06634e7284862
SHA512a21441522a4f5e7e107bed9b0f7dc8eff74a1e2a59a2b694bd13872b28428fd8c70e2990b302f45d1f52d778d1f1661e0bd4472d5ce0a617812b350f7a333248
-
Filesize
2KB
MD59a91c428608dd99ca9d979326456100e
SHA15e24f80f47abbc37f38b206e8e7d914209887414
SHA256d4d27240e8bc5738086fe9a8f1859d6ed60d44720cbe4a5e3d61a6ab7b421bc3
SHA5126f8b93c1d745e7c869a3134399538590068378ff07a596ab6ff2033a45f8a7aed26ab96143c07ed8346387a116ba4590bffb7f931132d620123b661b12a14bf3
-
Filesize
3KB
MD5327ddb6b8e6590fc69a046596148e324
SHA19ade16182e5aa194ff8d21e89bd004f7df9a2334
SHA2569a89df17f6b468a0aa07986b03c54b913a83cf8f754d6ab0390a2dce2d0fcaca
SHA512f33017b665582e18b88539a47eee67680cdab54301dd8443b4a7c250e9c8b0122a80079dfecc7d13cd0a1486671b05a4df5deeeb0474606783d2145eddbf6130