Analysis
-
max time kernel
27s -
max time network
132s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
25/08/2024, 22:01
Static task
static1
Behavioral task
behavioral1
Sample
6547db520e9151abad18f578065b1fb3ccfc1ab29c5525b5dba6ba38067ac84d.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
6547db520e9151abad18f578065b1fb3ccfc1ab29c5525b5dba6ba38067ac84d.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
6547db520e9151abad18f578065b1fb3ccfc1ab29c5525b5dba6ba38067ac84d.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
6547db520e9151abad18f578065b1fb3ccfc1ab29c5525b5dba6ba38067ac84d.apk
-
Size
1.7MB
-
MD5
76f13d5223bc46d68918c4cdfa72d852
-
SHA1
227a7d34ce680568e38a5f893401c4ee22b3919d
-
SHA256
6547db520e9151abad18f578065b1fb3ccfc1ab29c5525b5dba6ba38067ac84d
-
SHA512
65ce5ad8f48b1157d2c55e5f2f45eadbbea12d8c87f3fde7698f36f9efafb49bea2ff3f81e0dafd5e7291df52966e477aad01aaa15afc0e1e889611a8a33a4c5
-
SSDEEP
24576:7N1gWZNzEKshPPX2pKwquQkmwOuo0uz99LlcOjCFJLu/u13AWEsicWDgSHKQ5Xf:7/GhPPX2QwykyTVznbg6oWgSHZf
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener pkmast.pk.yonosbipannel_new -
Checks the presence of a debugger
-
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo pkmast.pk.yonosbipannel_new -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo pkmast.pk.yonosbipannel_new
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8B
MD5563cfe907c22ec83fcffdf75dbbd03e1
SHA17a16eefe47a4d24c2b3f2b56898e8201fd8f2d68
SHA25683dddef3c22546f2d5f74915861972ce22ca1700d3e445e8f9d4cafd4b07a6fd
SHA51238d2eba7beb39773c43420a843afa692c14965d6042d161a61e55ec1b2d81e085be56e58d05df7931e923e3c111e160ad75b2fff34aff9abd25a7de12c4f4f2e
-
Filesize
1KB
MD5549472216eb6b4dac7bb8a0399542600
SHA10293179c1fdc22acd777bc34e2817ad3e78f0796
SHA256002dd7512f5a5c1b0af98bafe741cee875545f8d2fee939a6765929c78e1d81f
SHA5129703a86c51cd1e731d54c89d34bcacad44cdc46302201d5833bb91037f7b66a6810b58ffba2d4b4ee4470bc7481e5e998a35470150eba884f31936cb775c2afe