Analysis
-
max time kernel
20s -
max time network
38s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
02/08/2024, 17:00
Static task
static1
Behavioral task
behavioral1
Sample
Brawl Stars.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral2
Sample
Brawl Stars.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral3
Sample
Brawl Stars.apk
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
Brawl Stars.apk
Resource
android-x86-arm-20240624-en
General
-
Target
Brawl Stars.apk
-
Size
10.2MB
-
MD5
e97b039ac6da62957451a4f624a61ed7
-
SHA1
a09b5d2e8d35ac7f8b3cac421f88774c220c1b42
-
SHA256
e24fea12d4dda1228d1c31e2318bebc9cdc8e146aee900e69d6f691838cdb59c
-
SHA512
d1ebf4669e02e627c64c12eaeb89e4fc4625d43c86f8fe56bbf6794c1b2c6c244ded2978c496eca5c8da255ca78fd45f080ec243740a9782e34f3ffe91fd2312
-
SSDEEP
196608:PcXuU9Y5MoTubltQHFiuBEWVPT+VUWh/fZpjIAHI2eyhriYH1QQmW10Y4gkGuX98:Ee6oS7Qo+LVW9JfXbQjRZu
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.example.application -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.example.application -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.example.application
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8B
MD5b972d90013a1105db93dfc992a71a94e
SHA193aba23464c31a108bbd2d4eeb4b227b3396939a
SHA25652efd9a97d76186feee8eaab9e1b064c49160d088b704411aa2d2d7c3b347f24
SHA512828ae5ad74d8f17def93d8a90a624a1ab2a9bdfe7adfe90422c6ce0111bf1ddb70771909faba395d6e4f6180cf9add60210321265126905abe1ed7f1c256c7da
-
Filesize
5KB
MD543e6a7f94ced0efaf012ea6cacef718d
SHA1125bbdca16dfbc94d8e6572703ef2f355f88696c
SHA256edcf1b74e8a71e8ba7b4586107ca2c6debc43946c1f206a9aaf5a212f365f24d
SHA5121a263d00ccacb633587ed405fbc58c398da2964872a60c07ff3fb2e63ebc633914e7d68b776806abf507800fe64c6f6904fdf11edbac317675f148881cb9bf1c