Analysis
-
max time kernel
177s -
max time network
133s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
18-08-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
eb19575f78b6cf2978baabccdc4f6014d1938eff16df020011f3ced5e7bb8d3a.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
eb19575f78b6cf2978baabccdc4f6014d1938eff16df020011f3ced5e7bb8d3a.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
eb19575f78b6cf2978baabccdc4f6014d1938eff16df020011f3ced5e7bb8d3a.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
eb19575f78b6cf2978baabccdc4f6014d1938eff16df020011f3ced5e7bb8d3a.apk
-
Size
4.7MB
-
MD5
dda2aae75e193c8aaa5343a50c8eac62
-
SHA1
3c2d48fe31353fd71c36e07788c238951b4a12f5
-
SHA256
eb19575f78b6cf2978baabccdc4f6014d1938eff16df020011f3ced5e7bb8d3a
-
SHA512
93c877512a1009bb7730f76e764a5bdff0278b7ddfcbe6bedc3e5b255f5580027bcc3e2edc70c138d0db2189a89a56c13a35a4cfc4d59563849add406975382c
-
SSDEEP
98304:SLvQgUoJzav7RMHtgFYlEWI8u3OCqjK90sQdjvo:kvQzoAvlMHt9OWOOCq290fvo
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.smsrecevier.bots/app_mph_dex/classes.dex 4502 com.smsrecevier.bots /data/user/0/com.smsrecevier.bots/app_mph_dex/classes.dex 4502 com.smsrecevier.bots -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.smsrecevier.bots -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.smsrecevier.bots -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.smsrecevier.bots -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.smsrecevier.bots
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.8MB
MD5e7da2ae21cb8905a7e92797e07c60778
SHA1438ed20b9e544097a57321b8875af6d3633a7f6a
SHA256d98de50ffb9e6195e125e575791028e8603c1027439cbb4e5c1013b56adf7190
SHA512c98d64903cb731d2ea44af07a43b091e771e428b42cc2722540fc8cbb6c161e8b2344c1136f8171e1f55bfb8348884147423803cc5fec8cfde0fe1e5f89ce837