Analysis
-
max time kernel
33s -
max time network
132s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
22/08/2024, 12:10
Static task
static1
Behavioral task
behavioral1
Sample
ea6726716f68d3f4eac17f9bbac9984e.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
ea6726716f68d3f4eac17f9bbac9984e.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
ea6726716f68d3f4eac17f9bbac9984e.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
ea6726716f68d3f4eac17f9bbac9984e.apk
-
Size
3.8MB
-
MD5
ea6726716f68d3f4eac17f9bbac9984e
-
SHA1
04b43d484aee9de693c17f45230b296b711cbd28
-
SHA256
2129662defe0e974b192e6479bbc55bba58d4e76a10aec97d482e3b769fd4668
-
SHA512
c5c102e66df53208534e9c5dec0bab1db49a3e6de29b7cf2987dfe3087bda946d849fcd0c5d19225402675f4fbc85d7b1f0ded6d85bc6d443ff263a307c5cf18
-
SSDEEP
98304:xqLIzMVDFJkgipugxuK5OAhZ//UEjARsqxo/KrQ4H2IaNw:xoIuFJ6uauK5Oa//p+sq4Nw
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.example.anew -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.example.anew -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.example.anew
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8B
MD5f6f5722d4f109a6dbe1d98dc5e9c60f5
SHA18dee42912c51f0780f09b987aebb683d00e7af1c
SHA256d8a5a9c52624065adcf499dbb424a7860bcbd834cf13c257af602f975ecef504
SHA512b272e8984a74f4cdb5947b1e4e634ec321170e769915ecca4c74e60ece9ad7060c86f70dcc5cdf70c864d97e6a1420a1fa2cf4c107b7131ab515095a7c406493
-
Filesize
2KB
MD567e609a3087bdda3fb5923a01626451a
SHA12e19ba3d41a718a681b81d67932d3dbc89382f7c
SHA2568566e6838d5e3c52c8ef81045fb5bced19fdc00f7a9e026fe6c8092f75b909e3
SHA5122c2ed0f91ce0f79a1520f9cedaa2833fc9786f23adb85d1a7bacad354e01c9027235a47745f369d334dcb99de3208092cfe179e275da123d9917efa868305b2f