Analysis
-
max time kernel
175s -
max time network
180s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
26-07-2024 13:23
Static task
static1
Behavioral task
behavioral1
Sample
app.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
app.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
app.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
app.apk
-
Size
14.0MB
-
MD5
6c95fd1b9364d6d5f5733e04b5cb9b22
-
SHA1
a1227308729d5322007dcbf52a4a281d30c20265
-
SHA256
e23f50927a4fbf7c0c6cf176fac5bbacd132c89687fcca3c8a6d57675ad20884
-
SHA512
44305e7a723d54500f1380cf8a4a51eabee8a6055d0fb6fdef07d8a994f39b1d12bede8c34226be016511be648c419d9f4d4915467604e447113aead8de359bc
-
SSDEEP
393216:S7XoVMGJywWBY+zhCDJwTpLuwrWE8NsGEJLZ7jKQ:S7Xo6wUK90ph16Nc7jR
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.tinders.citidescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.tinders.citi -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.tinders.citidescription ioc process File opened for read /proc/cpuinfo com.tinders.citi -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.tinders.citidescription ioc process File opened for read /proc/meminfo com.tinders.citi