Analysis
-
max time kernel
92s -
max time network
133s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
01-08-2024 22:07
Static task
static1
Behavioral task
behavioral1
Sample
1cff06f6542c2f6879bf2f54ca6f89fdabd9d3e41d67aa58670bfa7edd2768e9.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
1cff06f6542c2f6879bf2f54ca6f89fdabd9d3e41d67aa58670bfa7edd2768e9.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
1cff06f6542c2f6879bf2f54ca6f89fdabd9d3e41d67aa58670bfa7edd2768e9.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
1cff06f6542c2f6879bf2f54ca6f89fdabd9d3e41d67aa58670bfa7edd2768e9.apk
-
Size
4.7MB
-
MD5
47c3fec11449daecb163ce929d23fc9f
-
SHA1
59756b66f84a7c8c80e7377148b277678ba4edca
-
SHA256
1cff06f6542c2f6879bf2f54ca6f89fdabd9d3e41d67aa58670bfa7edd2768e9
-
SHA512
807a30bf8381a6ca5e174dc635526e393b7d408f6d453dc514161a49729cc6d767512c6b77283b62ad0c906c92a87610e869712ed96450407548604c66d3178f
-
SSDEEP
98304:bFbCkMYktsqYRK5JFFjQPA8cO7RiND+ZxSDWXu3F3sxnDKN4H4C5Ry:bFbCkMYxqYG1QPAfO7Ry6xSDiu35sT5k
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.google.Sabun -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.google.Sabun -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.google.Sabun
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD57e98cce8bab7441e5553d5de3639f0e1
SHA1212b18c844f69b572b683b28dcada77e36ba008b
SHA256432574f5c8f94f4224011c8dca829e5f2cfc67bfef11d3d65e1181e099661a4e
SHA512ddbc39f8d535554667cd8698dae31b61f0a16f2313a31bcf2781a8264e2251b846c5a0e65b8cbba26374660c70a2450611a317f29c72ede986d625f060250ebe
-
Filesize
20KB
MD5f37ed4628e44898d4138a8908be9fe4e
SHA12e39293d88f2b0769939946ba39af4712fc48baf
SHA2568a812bbdc456ce5925f73d8acbfcd8549eafa5d61a3526fe404726d972f1304d
SHA5127b8202ad65a6700c43ad2d5a31fadd9f88946ff09a710a8fc714165c006d23479de335b764a6efed859529eea887f2fb45bca2ec84c26bff045a6f46cc7216be
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD5f1679052a7fc3abcb17ebb4890febbc5
SHA1e2fd72bdbf2681093f543a1feecf60b642baf9e2
SHA256e9ab1434b511d03aed283bd2d380419c99a68446bc38caa618c07a9e9042ad0c
SHA5123d73687d99422903b9307cb05ddfb4f62dadb9655b9f413f059e499a2b15b88040cf91e7a6c4743ce619aa09734f4da1ec67e4b9ef78994e1195bef28f6241b5
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5930b0b4bb386741f985c5002f9cc37de
SHA1e17dc756f2e765ee56f9f4e99480c88fb9c58f01
SHA256f328593f75900a2159166ff78a3ab564ae956b9a512a92a16e05bad7b3d24f04
SHA512fac988400ca11cd8e7548dd69f2f7dfde1cc943b2c69590c8950532f9384799f9dc36165cf9c3cfba88eb4c5862d7a225ac8b02dfdf3250416114846d9d6e924
-
Filesize
108KB
MD5e17cbd78107ea30b862d130dbb85d54f
SHA1f5ad9e27867e3f0ef1ca496337282f0e9b94607d
SHA25683579f8e479966355c8eaa2e1b28d0098b36b82b3ce32eebabbad652c26a1c5d
SHA512faf13bb4b4349dc365808b2071d4b11067c97baaa314ffb9d02d0acee3c78eaad16117cf34a3f506e93896080b144880cd8221fd5b6874fb92abd35749693b01