Analysis
-
max time kernel
137s -
max time network
135s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
07-08-2024 09:19
Behavioral task
behavioral1
Sample
aa68436c0bb31f282467a6635da26c912ae5d8052b8d8cab878fa46730f13212.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
aa68436c0bb31f282467a6635da26c912ae5d8052b8d8cab878fa46730f13212.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
aa68436c0bb31f282467a6635da26c912ae5d8052b8d8cab878fa46730f13212.apk
-
Size
24.2MB
-
MD5
69a0337a9b9d5831d685deeeb4a05c1c
-
SHA1
5d242dfb147c1ba26166cb26a62981dc27d7d941
-
SHA256
aa68436c0bb31f282467a6635da26c912ae5d8052b8d8cab878fa46730f13212
-
SHA512
da7daa9ec791d34c7958457873b1a9cdf4a54ba43426ae8823f45227de020c2868f25258ded8db11a383fe66719d3129238b2a451d5db9cb0376d8ac3ad4bb09
-
SSDEEP
393216:3XwMxmk3ymCNrwkaAGP8hpApadToRL3f/ekqAxGo4OKpF024He2JVu:3XwMxmkCmqrwXAG0vy7/enujKpTH
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.companyname.x_9clubioc pid Process /system_ext/framework/androidx.window.sidecar.jar 4641 com.companyname.x_9club /system_ext/framework/androidx.window.sidecar.jar 4641 com.companyname.x_9club -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.companyname.x_9clubdescription ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.companyname.x_9club -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.companyname.x_9clubdescription ioc Process Framework API call javax.crypto.Cipher.doFinal com.companyname.x_9club -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.companyname.x_9clubdescription ioc Process File opened for read /proc/cpuinfo com.companyname.x_9club -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.companyname.x_9clubdescription ioc Process File opened for read /proc/meminfo com.companyname.x_9club
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5bdf3529e80318eb14e53a5bf3720c10d
SHA125c9ace4b1af6e80ebb2572345972c56505969ba
SHA256bbc8300dd1e9cd08de8f66560c1ac2c928615b72b51cef9649f88974f586d64b
SHA51248b9c2d01171bb651b9b54826baa51f4add48431a3efd8ceb5f7cc3bcd6f8f37edf47fabb24349dd15b3a02329cd450f90a8d164bf4f8dfae554bf3b35a8a55b