Analysis
-
max time kernel
26s -
max time network
134s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
26-07-2024 11:04
Static task
static1
Behavioral task
behavioral1
Sample
7acfe7b63643d844cf76f2605ab3254d.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
7acfe7b63643d844cf76f2605ab3254d.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
7acfe7b63643d844cf76f2605ab3254d.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
7acfe7b63643d844cf76f2605ab3254d.apk
-
Size
5.2MB
-
MD5
7acfe7b63643d844cf76f2605ab3254d
-
SHA1
18a739493dee77f01c2f44060fec56347b47eed5
-
SHA256
03d16dd7b6cac3aab315209c81a9c03267a4bc92f8c4971afad80c86f50b3d4c
-
SHA512
243478d49dead1d728cea64a3d39877c464c1c63f27a948ae63683c3c9a2fe536cf3dc2361cb88d6841c3a63dd927c4d51f5c3bd09a4830ed4e60265eaefa44d
-
SSDEEP
98304:tr6MzhUpYTaBz19NDyhD3kLasfj+n/+e5+IBIEJyC4vIEjIL8l1M9pqo/KrTH9E:tr6MAma91fDylBsO/v+I9JkvF+8l1Gpt
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.gurujifinder.mjprodescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.gurujifinder.mjpro -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.gurujifinder.mjprodescription ioc process File opened for read /proc/cpuinfo com.gurujifinder.mjpro -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.gurujifinder.mjprodescription ioc process File opened for read /proc/meminfo com.gurujifinder.mjpro
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8B
MD5917ef6f16df715c2abe1db4b98d5b16f
SHA18fe3c0ae04e3b710a67c15e940212ca511dc23c3
SHA256873ebc61782330fff53ffa5ddfe3dfbf5bd0684a24dbd81b745c55a895051304
SHA5129230b747e3fa4cb30c4586b244a3a93d95b937c389e3e56c39fdc3e5d57ae45a11c12a98d2273795b8d450ee0c2202b651080e2c777777a086c1b5eda023bd78
-
Filesize
2KB
MD59a91c428608dd99ca9d979326456100e
SHA15e24f80f47abbc37f38b206e8e7d914209887414
SHA256d4d27240e8bc5738086fe9a8f1859d6ed60d44720cbe4a5e3d61a6ab7b421bc3
SHA5126f8b93c1d745e7c869a3134399538590068378ff07a596ab6ff2033a45f8a7aed26ab96143c07ed8346387a116ba4590bffb7f931132d620123b661b12a14bf3