Analysis
-
max time kernel
29s -
max time network
168s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
28/08/2024, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
f5e578d2fff1a61052688dac80a13ad49dfa2972e7682bc8e80d2a7519d2aa2c.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
f5e578d2fff1a61052688dac80a13ad49dfa2972e7682bc8e80d2a7519d2aa2c.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
f5e578d2fff1a61052688dac80a13ad49dfa2972e7682bc8e80d2a7519d2aa2c.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
f5e578d2fff1a61052688dac80a13ad49dfa2972e7682bc8e80d2a7519d2aa2c.apk
-
Size
3.4MB
-
MD5
2b00dba02475baa8459a3861d04c6f1b
-
SHA1
a70a940352a7dbfb769f2ecb6217f5955a3b0c70
-
SHA256
f5e578d2fff1a61052688dac80a13ad49dfa2972e7682bc8e80d2a7519d2aa2c
-
SHA512
3fdcd72756f29cca5ff427c155b710a24a776ec8ef2fd929460c8745abb98ad78ccd6f8a7f6061e154e5fe909347bd486f561607d70d1be3c22ecd8fd42df1f1
-
SSDEEP
98304:8az1lejwGkTEvOV4TNtKIGgh8tuY0BhHRPaY:8az1l0kTEvOV4TNtYpcBJF
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener pkmast.pk.yonosbipannel_new -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone pkmast.pk.yonosbipannel_new -
Checks the presence of a debugger
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver pkmast.pk.yonosbipannel_new -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo pkmast.pk.yonosbipannel_new -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo pkmast.pk.yonosbipannel_new
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24B
MD5deea1c2e88b12a3a6fa1422bc905a807
SHA1edbf6af313e6ee391fab6f0dcdda2a7f569498bc
SHA25614cbe97a55c9feb6fd7120fa0cb5fce7e33b13092b0380c019958306ee4487fe
SHA512efa72d51d9f559eba3bea4734a45e0f30909dea3bca885af5f2cbcaed1e0874ec7f600831999eddb33d291541b928b1fd9128488aa14bfe26f6754466a87141c
-
Filesize
8B
MD5c0049c0ca8da540c783b0eec501746ff
SHA13b3b55c108e6c351b32031925cf9aaf065a3fadb
SHA256d55be523413d09587a3e13e353991c50e1b49a6f7adc331c3d0c1536763edd35
SHA512ac50fcdd0e5939ac0dd88b955d4c772214a2fcb6757a2ade7ff93e6dc2564dd41f25548301f8a569353cc5278fe51371ac62021a2d2fd26599267e16ad9aa14b
-
Filesize
1KB
MD5e9c7c90d758a7a482917dd302e16d6cc
SHA11bbae0962698d06cf0d7f9910e5867a33a83505a
SHA256c19aef5ab9f76e34c8ee4b1bea808b3828b5d140344f24f0fedd1d26e92a4514
SHA51280812bcbbf3db2f31c2a5fb58a423ef987c4982e3d8d34d96d49d4a8945ef5c0eb7f35bb90ff733e1c0f505b52b1fd3e16f3ae7e496f7974e529db17f37ba39a