Analysis
-
max time kernel
19s -
max time network
157s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
29-08-2024 08:28
Behavioral task
behavioral1
Sample
8e00e43db6939f7aa53999cc8d8d687625c42a1c707ca74b9d540514cdc7d65a.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
8e00e43db6939f7aa53999cc8d8d687625c42a1c707ca74b9d540514cdc7d65a.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
8e00e43db6939f7aa53999cc8d8d687625c42a1c707ca74b9d540514cdc7d65a.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
8e00e43db6939f7aa53999cc8d8d687625c42a1c707ca74b9d540514cdc7d65a.apk
-
Size
2.8MB
-
MD5
4c307e6962c91e6ba9a7a85f662f5db5
-
SHA1
c76926b8d6af7f8718510c200f2083f842ba1ac7
-
SHA256
8e00e43db6939f7aa53999cc8d8d687625c42a1c707ca74b9d540514cdc7d65a
-
SHA512
17112c92ba8ad9a36ff8104b6102d33308effc4f520f3f430b2dc00ffd50b1efc4b9ed6b675597b57b9809e805ddaf99553069a7882e62f0c6191c85a4e52cc4
-
SSDEEP
49152:uPSe9096pV6rX+Q1VpBaHoIkoo59X9SABZ+nm98mFBXAwtWk0ESkbU6Yf:uqe9b2rX+QFMIIkh9tSABAngW6af
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener X.God.X -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock X.God.X -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo X.God.X -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone X.God.X -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver X.God.X -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo X.God.X
Processes
-
X.God.X1⤵
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Queries information about active data network
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks memory information
PID:4922
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD55e52f1d901c97b6dd4db7f3460e0ebdc
SHA1500e515892e208f3d8c1ff3ec63b3b849ee052d1
SHA256dfb8b09d5b14f06e1fc42c9d188fc4ca3a5141240d6ba18554920e8b7e174252
SHA51289647eae93f58e4344ebca249c482352acb50144f053d0c11a871d8ab47e01375808a29523326f1c8c37413c95925beffa8fbe3f10158c1801f7450780d87d0c
-
Filesize
16KB
MD5689355cfe9ed6bd702470f82d2b8075e
SHA198251a358337057f82d6ed658f5c222636e40dea
SHA25618ed004f3f1753f5cf82a4b34f84e556ed20d8591fb2da930fc48179d63960f3
SHA51223c175c222d33a3c6cd41a0f6199b3d561172965a9fa6a15114c11716837f7329a97bdd2d3d3a5b4ff46135bc2213b41b7d468db25f03fb75dd54686e073ab61
-
Filesize
16KB
MD5d226326aa2fc83e210c9dfc76ef9f788
SHA17e514bd9dcf0c53b6efd5068f70bcc7f6df6078c
SHA25601f59855dacc4fe205643cc5d081df5fece4be5595b3229550e4f51788b47542
SHA51265ab421f32a13d18b08983189ca624bcce2f8719bdf75082db32a568b70a207ae33951d8381d4d7ba8ffc6ecbed933b622885b88daf0ecdbd3264edf67ac6023
-
Filesize
16KB
MD5e7a7da4274d97862824d0ba3ba1fb974
SHA1d28ba15325b13086bda182377a0be97ee861466c
SHA256f9f2b14280065ef5167be73a07428f7f418bd38905ccd3877f143e78a7f4210e
SHA512baecd2fc91c1e22c00a8e66d226bb4e2d8e3034aedb84f1d376353f865b814b026fb2494381aecec1153ba69f15ff6f2975094d0116b8f80e6d510903ef357a9
-
Filesize
16KB
MD5adf6082723784327d7d1b34adf974e7d
SHA1b1502f70eb881a1dfe41139cb719fefb877ee37c
SHA256252defb835b04f4af7c59bde7bd119664e901928f1373171a287897e729cb2a9
SHA512762f146c452e590e0e3015a080e9821b5488551b9cca7a212ceb11a853ddf6b1894c99d09ba20e6691f5078aaa8e17a6ed66dbbe541eaee152978fab6884e27b
-
Filesize
16KB
MD5eb52a90bb70b76e946b62f50b6f7fb85
SHA142d767b5d1faa7dcef4cb4e1432a5f47ec2e9ee0
SHA25648472f593a3e9cf9e91ee5f7d66dd9ff291bfb247eb6b46778c710fc24e8d3c4
SHA512b356c858cadd14b6ecddf134f1c494c0107a1d36be9387984fc53dcb00e6779d944f058f4ac99d0fc2fe3a427cd1c2921c6fc38ecad53909fc4b5b6f04459b5c
-
Filesize
8KB
MD5aaec7b8b2840496185a693d692f9caf7
SHA1f1726cbf2f73e5c4d9ef626e29f6207ee1cb3d32
SHA256b0f3b37abb824c50ca7a5d37790b08c512b3a17f9a920ec8d6166824668e5a1d
SHA51271fe94d37e1686a3b2da81e3b2a971367f47fe5d3bd819cd11f36efb7df0c1dff2078f575efa9c0abe5ffa2b8e2afb31c56b256c0503f7f9f59c1ece32bfc5b8
-
Filesize
8KB
MD50d6be2d8b2278f697698f8eb52c90815
SHA1fa789565ac5316584d0d1cb769134810d20a5492
SHA256573ce333f7d17bf3ab008ba4ab71a5a86d1c41128b189152cc7fd4a30c8a3185
SHA512d6b1132b61b7de5e43972568884a2437801b75c80ec871fad9d54a580a0bc489e751ae153fdfd63cfd54114aa07a1381629eda3a5eaca59d41136f2bedc856c9
-
Filesize
512B
MD5e7c9fb03bcd2b5a4db0b1bba552439bb
SHA1cbea3f9c7ba0f10d24e7b5bd0a3d376e1a2de75a
SHA2564e8c4021510e7b9c3ea40ff2b5cc144dd0e56ce1040f1b19666bceb080246a05
SHA512cd3bbc88ce9035249dded91aefa8155cf7ebf07996209251f2260e38e9948790016d1a9b4a0a855ee435ea8f543baf5d6d3a764fec70763c6d6dc958ce5bf0fa
-
Filesize
8KB
MD5016dc44b881fecae8e4f93f5fc4bd001
SHA1b97cf2e45b52fb5dd013e280f1235a1a9405901a
SHA256070a699af826c66e2bae8903c252b1e11e5c60dff06e2d4d8719cf7b2db8afb1
SHA5127489990b87cc2f756700aad798f74b64153c1a70a09095ba2438069e017a5b279d97e46364b3350bb91bbf958bae532d7e4bc4689ff299154d1c7294a78fe711
-
Filesize
4KB
MD5d35509ee08cb737666dad2d854417fc7
SHA16df1797b14e94df0d578600b1b4b84fd0eb7beda
SHA2560635acc568b6a73630cde338c13498826772f5ff5aaea989867066c71090d605
SHA512e28254d0ae316f4de503c436705d70ada51d734703fdd5383d6a695df9817a6ce3402bb0d8caf8a77dbeb3ab47521071cd7861f4534a0c9505825ffcae1c400a
-
Filesize
8KB
MD56eb7bac2bda47203e70309a72e07a5e5
SHA143742d5d47f7fcedf3faa636ac68fdbed19a3ada
SHA2564bfe626639d55a15ac339202738d49b4238442d5e7910bf095d2bab71b16dfd9
SHA51239f3ed766520d001db4ed70cdf2f738cd1fbece20954e4bfdf65330a57d82cea9f9396e3bbb0aba96adcb06c7095802f58b30723ca55c99488668f9967306d45
-
Filesize
569B
MD581513e37015ff989011f32be0a19c922
SHA16251e93f97a74025e280e82027c8a0f48cf1c283
SHA2566a24e96f45df23601b30da5be60cc5d96da8038b7bb99d21c0c16023afae59fa
SHA512275100957113b8e53a949288d5db546f8ddcf99dd78afd4f57b57baeac487491f73abed9ad784ac089c306726c85a36a531944eda9a15e9e16c4ee6f6603f3f2
-
Filesize
90B
MD50466e7c75ad43c862be3e00deea20e90
SHA10b76eabf1211caea36e14d68105f2be083a06d5f
SHA256e3830a7c41c838eb481453da2847a90532b0164026fa2055cd90012c65a21752
SHA51284fed7d53a3a9615eaa44bbd958d8ca765c4f464a38e99f2d0178f8f5028f2bead3fe109e4311bb624754e14f3c5de42b393ce73767fed812091d63d58ad8a9d