Analysis
-
max time kernel
87s -
max time network
134s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
11/09/2024, 15:38
Static task
static1
Behavioral task
behavioral1
Sample
jpmfutures (1).apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
jpmfutures (1).apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
jpmfutures (1).apk
Resource
android-x64-arm64-20240624-en
General
-
Target
jpmfutures (1).apk
-
Size
6.3MB
-
MD5
ae22fade50dcc3409c68f830e1f2953e
-
SHA1
721e0297e26fa482c86e6df92a7c04b280f8f2e4
-
SHA256
f027108114302d5f7997ba69cf3a3f2cbf02207aba6a7db93d9599453315e3a2
-
SHA512
eb1f503ccca07df88c67c36b6cbf8efa4dd65d693229dcb43a443cdd5efc6b94f88a862bb5be938c9c737c12af6b8e7461f5f4fedb99b18876fa3b7f59aabb6c
-
SSDEEP
196608:802YX10dU1s3BgRvlZndEKOzAWD8TkXXSU+nxTCYIMA:802Bqixq9EakXx+nxGP
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.olubj.nctl -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.olubj.nctl -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.olubj.nctl -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.olubj.nctl -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.olubj.nctl
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD5f4cfb6dfd6e51b4137c13e46b939b1c1
SHA17d6804b044c85f1f3078cb4c78962d6040c0dfea
SHA256feb7c383660f0c688e47c74419cbaa669b788e31331c4803476a4b424f20f9bd
SHA5122b6db6d064159aa08bf6b9af5632d2e02b7f840763bcc26435d473aef17e287e8d7b071c7eb69c22736724fb692ca0657bcc3326efd45664cc38d348a4772abe