Analysis
-
max time kernel
46s -
max time network
128s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
03/10/2024, 22:08
Static task
static1
Behavioral task
behavioral1
Sample
bc6b349e02842cb9139bec4f529363769ab96b16a854f55ce3271b1c95502437.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
bc6b349e02842cb9139bec4f529363769ab96b16a854f55ce3271b1c95502437.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
bc6b349e02842cb9139bec4f529363769ab96b16a854f55ce3271b1c95502437.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
bc6b349e02842cb9139bec4f529363769ab96b16a854f55ce3271b1c95502437.apk
-
Size
4.8MB
-
MD5
4d00f9f80d8e7e985f3c0291d6d6e362
-
SHA1
ac4c12af0f39000171e64b6ab262abaacef8c3df
-
SHA256
bc6b349e02842cb9139bec4f529363769ab96b16a854f55ce3271b1c95502437
-
SHA512
9fc37779ae0281fa3ad9335486b03a6b5136fa14c89ce2038f285da419ebaddc85111fa228d9bb75b69d7b88a6125d4f98c973fe824529fac705eadded7c2dd2
-
SSDEEP
98304:UiKg5jmiA+WTZrQz2wdu/ct/dV3v7UVf39+q5wO17nO5mgj3n1c0sIod2ZrYrEvP:Uij5FcdwU/ct/nfcDrA3n1c0s25B
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.google.myandroid -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.google.myandroid -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.google.myandroid -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.google.myandroid -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.google.myandroid
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5405501e6ab8d0512f7397b4557acb7b4
SHA13a083689dd8713229b2ce8c44e726d9ab4fe1b61
SHA256756895e426a020c43b49dfcb99432415cff21a98e2002f372dabece53a9c7bcd
SHA51233569ba446749515f1485ecfac61071acd565c5278418fc554dd39b8cea2188bd4c77e4b054307b10bfa53e5e1a9d58c358bd49a70f04740069a2bbf75b5a5a6
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD54152bd75be2a220b3aa5db4d43729e16
SHA150940b093008ac091f0ef22f7f255bae5f210405
SHA2568c6d013a1fc7235d7721b2365e8b60456f7d3e5e904e5455d3d243d176f8794a
SHA512e680ba052a21a171fb0ccae935e5580a5059aa8c9c35fb4a1e70ccf0788c5e5fecdaad0dfff4ab852dd471c443129c5bbb7433f9f3b1e3e994dd68d738eafeb9
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD54164dc31d1169a857a50738bc0517738
SHA11bfe717c8808a264c3eb408acb6751badf484e25
SHA2565b1adb1692a3c34acb1a544ace7aa3a62c7cbda6e4a069d5c5af53e32c87b010
SHA51294ad4a8d4cabf1ff76c059de1e3633d433fd618a7a5cafef0596ec997813cc623aa2fa6b867fa95e8e7d59e7ce3d4f9a9bcc2bb6ffdbffbfadec4a6e25f04b41
-
Filesize
108KB
MD57717a5e28b23fb98953e866f64a207a7
SHA12a8e596c3cd4af857c4c6fd0d7c0a435c23d1354
SHA256cc3c5436d80e2873d92e8cc499f6ab076a5e37bcaedf9afc6e89fd5c8a025e8e
SHA51230dd06e0ba27d355caa86895772ea283929de70156923f05a68eaf6fa50a8ae6cc34aa7602687ef603841cfd4310531cd0fa2ef54381c831358e6a74287bffe7