Analysis
-
max time kernel
26s -
max time network
166s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
27/07/2024, 22:01
Static task
static1
Behavioral task
behavioral1
Sample
6d7689b3a6f7c0e583813f18e346b32ee3cdfee399ea2f01c15395158b0113f1.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
6d7689b3a6f7c0e583813f18e346b32ee3cdfee399ea2f01c15395158b0113f1.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
6d7689b3a6f7c0e583813f18e346b32ee3cdfee399ea2f01c15395158b0113f1.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
6d7689b3a6f7c0e583813f18e346b32ee3cdfee399ea2f01c15395158b0113f1.apk
-
Size
1.8MB
-
MD5
9dbe1b043fd4be01e55e073453f31299
-
SHA1
84fc9a597dde41a4c77c02d3aabcb03849f85137
-
SHA256
6d7689b3a6f7c0e583813f18e346b32ee3cdfee399ea2f01c15395158b0113f1
-
SHA512
97743e168fbb5772e91c61d73237c9bd66bb564ef3b76df1486074d5b1f5187b07930db49f92828aeb82137baf346c9aad7333d0b2a33bf2c1ffde79bc4fc53d
-
SSDEEP
49152:+k5nth2thbnYHAuBAX2GjP6OiyoAgSU3u:+krAHP6qo33u
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener pkmast.pk.yonosbipannel_new -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone pkmast.pk.yonosbipannel_new -
Checks the presence of a debugger
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver pkmast.pk.yonosbipannel_new -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo pkmast.pk.yonosbipannel_new -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo pkmast.pk.yonosbipannel_new
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24B
MD5b8dcb7d74027ee679a6fb68e8646872e
SHA10d47f5cf7a1c5a61b828b8474a7c6bd3629fc807
SHA25698b663a90a9da1f6ccd2746a73ab8b587ccdc158e427abe8d96da59eb20f6f3a
SHA5123a36f53786982967b1a41f7c83818997b61210ce5380d059cfcda0e41614611185dce32fdc84192d64583df15b6991e41b3f5d059fb0ab22297fa5ae8a979bbc
-
Filesize
8B
MD5b18c755929a675e33135ca1259c1d2b8
SHA1ed50cec4972be37905382b1b08e45aa79b5c409d
SHA256ec1839994e8125f7b29160346f67b0851ea87d5a7d8ebbac7372eae5d9dd0364
SHA512fb97ce317beab009bff8abf224e9c9d9813e8108ba386c50b09a5f898ee0b282a63a25a4cd4e4591905f22ccb2142d2293881bf1ff9f5075f6c687fde46aa713
-
Filesize
1KB
MD58eb8c09acb08bfac356c17a4ee2c8743
SHA1c4135df6864d897d24ed98a25b58af62cee7b866
SHA25667b8e68661200e48b5c83721ac358a0d87c8f5bd1dc500980646c4fa98d1429a
SHA5122246b18b4dee2ffe9de4c8b0ab8bcf60f6c178279adba29484ba64355ba58a0861c9f7fbcae42c3018012f34bf98b7769071b56b1bec287e951ff3107b907bc7