Analysis
-
max time kernel
53s -
max time network
131s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
18-08-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
13b189aa4a42cc4705ac9025e60e4e5621843ae7cd2a2082fade2f3a958e112d.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
13b189aa4a42cc4705ac9025e60e4e5621843ae7cd2a2082fade2f3a958e112d.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
13b189aa4a42cc4705ac9025e60e4e5621843ae7cd2a2082fade2f3a958e112d.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
13b189aa4a42cc4705ac9025e60e4e5621843ae7cd2a2082fade2f3a958e112d.apk
-
Size
4.9MB
-
MD5
f792342a91e593bc93611c5494b52015
-
SHA1
83de00905c54fc2d4687c8c75bfb965d32adf2dd
-
SHA256
13b189aa4a42cc4705ac9025e60e4e5621843ae7cd2a2082fade2f3a958e112d
-
SHA512
1785011163473cde8c3c4f561573dbb19501cadf9f46e43394d71e86eb1212b2c8e43abf6a7de721fe224481c8f2b5eb6d0368fb3849c88ae321916cd39e9888
-
SSDEEP
98304:vNZWHhzk1IZM6kLcizuypsITBsQnNtOjw56HD+q:Yw1IZMhP5psa/vI
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.wb.goog.mkx -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.wb.goog.mkx -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.wb.goog.mkx