Analysis
-
max time kernel
23s -
max time network
34s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
29-07-2024 22:26
Static task
static1
Behavioral task
behavioral1
Sample
lesehantoto_1.0.0.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral2
Sample
lesehantoto_1.0.0.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral3
Sample
lesehantoto_1.0.0.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
lesehantoto_1.0.0.apk
-
Size
4.6MB
-
MD5
80a8fb80aa38d2e2b84ac24c7ded90ff
-
SHA1
778a4d5eb9ffc71eaf0aa35624e1e4f441b214b1
-
SHA256
8f0552a3769cf916f03164f8fdfdda03c67ed50c15c360ce0e340e5e6107abae
-
SHA512
308a6fbf096f58462b59716953681e53c06c00cfc4644d679598b07f9d9f1370c8cc19e26bc81c403b8d84109a8a69b96d8799585addb697ccb472a3425b3852
-
SSDEEP
98304:p6F9AVu+tNKqxxR174lyOZithSwDvn/yi1aN3ncgLCr4Gu:p6LAY6xRB4lyZs2vn/W36u
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
net.atg88.android.atg014description ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener net.atg88.android.atg014 -
Checks CPU information 2 TTPs 1 IoCs
Processes:
net.atg88.android.atg014description ioc process File opened for read /proc/cpuinfo net.atg88.android.atg014 -
Checks memory information 2 TTPs 1 IoCs
Processes:
net.atg88.android.atg014description ioc process File opened for read /proc/meminfo net.atg88.android.atg014