Analysis
-
max time kernel
51s -
max time network
167s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
02/08/2024, 22:07
Static task
static1
Behavioral task
behavioral1
Sample
60d172b1bdfbcb5ce4c0dca167d209b7f2482e36cc43cf3862fb403bda890982.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
60d172b1bdfbcb5ce4c0dca167d209b7f2482e36cc43cf3862fb403bda890982.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
60d172b1bdfbcb5ce4c0dca167d209b7f2482e36cc43cf3862fb403bda890982.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
60d172b1bdfbcb5ce4c0dca167d209b7f2482e36cc43cf3862fb403bda890982.apk
-
Size
4.7MB
-
MD5
1e5ea4830d53868125089cfd70544f04
-
SHA1
5e7bb45c16065987af04ba01dd73ca93793243f9
-
SHA256
60d172b1bdfbcb5ce4c0dca167d209b7f2482e36cc43cf3862fb403bda890982
-
SHA512
6e36d9d00faac2df8c4db81f4569156168907db5b5ecea1da88c20cec34e0e9d143c76d9201a4b9be0e6eb93d4295ea734e9be3b814d4c1273cb7abeef0f71f0
-
SSDEEP
98304:KTAmV8R7KQP9tyCWFtgxTAsukUb/mP0HglPlqKcpRn5sd7DKN4H4dm+:KkEINZWFtgVAbmP0AlPlqKcp95s6l
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.google.mesedoc357 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.google.mesedoc357 -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.google.mesedoc357 -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.google.mesedoc357 -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.google.mesedoc357
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD59ec76b771c3f71e959fe4d540dd4a247
SHA1bb2b5483c2a4bf88802aa64434946ff60db4a38b
SHA25655c181699015cc524c5f6468cfc06828bb164c23e86a772c257c8439d7d403a5
SHA512c3c1c02a42b124e3a2c5939b19850fc511f73bca80fee29f819995910a20453025cb85a457d84da17fc08cdc1c65fd671f23e8bcf3986cd7344e04487e362149
-
Filesize
20KB
MD56fdfacb046186d92c5a0f6ab51097dfc
SHA122f368f9ef8c2328512652b6989f39206747768c
SHA256840d15348ec0bc18a9baac133641252ea56347c86a964d919ceb3f6ee60ddc76
SHA512e8f4368e7eaba0a9a3abf0e233d488013364c6d4659e475627f4ac7fb897a397ba61cba5cda52b9a57ca4d0b440860a723e5684b4faa28cd9579f0df26040ec4
-
Filesize
33KB
MD5e6e75fc275d0492aa64a2d8bd1dba4b5
SHA1db33f0c98de048001b4c7c5fd4618187c38cc5a5
SHA256537a1f1cf0afa2060697c162973b73bb359c7736c51ad4ef89dc34be614d0b4c
SHA5124f7c72942f4ad0b1ba69cdd7ec53623e7404ee15de8d12bd3f605de8f3d3b593473aa4757c859b1d7765c90954aa659c2ee572b3b4261909248ee2e91cf24408
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD555c0e190a900ad8d0ab1598194ad99bf
SHA175fb71377428adc1b949b8e864b1cbf96f77bef8
SHA25648302452770c88163afaa69d1d06e3a92d91cbcdd7fc8ecb2e04d930b1d378e0
SHA512d0057feba93d0d1bf230e88dcc5868ba805a393782362bf7dac3c302d3e23633f5dbbee77f809f420729f083d484a13e6e39e0d444d676ccaa26dbdb8d05fd94
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD559644f5119f6064408772ce296c9545f
SHA1f68e87433e374d27a959e1629926d87d15a9e45d
SHA256d141c6877a4caad770a4a37834fa7098f641e91f715be2411a3ecec234dc4106
SHA512859941cfa1b59139fc46d5dee963c4604b49556c7c86688159d03845194b6fc3602cea9f4f512775c7a4004e394d2dc1ccc5a76d4ddb34083639d75538347a49
-
Filesize
108KB
MD543724a8ec30e5da77be72db01703cd91
SHA145219f3519e07766eab8eb2f306e63d950270146
SHA256bacaab4bc11a1804ffd26749a4b1d35b71c88de63568764d012e75062f0b5aa6
SHA512b4c6dc82b1739ce688d946a1404cc54f96d1c6afdb004c8dc374eed077ba66f0a4db28ec1f834621c6fd2e0b28b170a3fece400a401b8e8b38cc120dec469ad0