Analysis
-
max time kernel
137s -
max time network
147s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
04-10-2024 21:26
Behavioral task
behavioral1
Sample
EZFNLauncherV2.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral2
Sample
EZFNLauncherV2.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
EZFNLauncherV2.apk
-
Size
38.1MB
-
MD5
147e6b26aa1f252bf912c7a1c3a01cb6
-
SHA1
2cf8e0ccb43311f5885d95bc0188462077a9f77d
-
SHA256
af6985992d674ac664c07a659515de10eae7ecade0183fda28ac46bb83bcc425
-
SHA512
89a72e52c0b739bdde18c80aef5ab162cad73f88a077429d3aff34c7d84ae7206949d5145acede4ff3359d324323fece006230a70064380e1878b3020172e89b
-
SSDEEP
786432:/Ym2d67A9Ls3unQn1SxlMTpxABB9F5d3fHQ62G3Zu3V0u/U1S2G:3Tn1SvMNxABB9vdx3ZgygUhG
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.ezfn.launcherioc pid Process /system_ext/framework/androidx.window.sidecar.jar 4471 com.ezfn.launcher /system_ext/framework/androidx.window.sidecar.jar 4471 com.ezfn.launcher -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.ezfn.launcherdescription ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.ezfn.launcher -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.ezfn.launcherdescription ioc Process File opened for read /proc/cpuinfo com.ezfn.launcher -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.ezfn.launcherdescription ioc Process File opened for read /proc/meminfo com.ezfn.launcher
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5bdf3529e80318eb14e53a5bf3720c10d
SHA125c9ace4b1af6e80ebb2572345972c56505969ba
SHA256bbc8300dd1e9cd08de8f66560c1ac2c928615b72b51cef9649f88974f586d64b
SHA51248b9c2d01171bb651b9b54826baa51f4add48431a3efd8ceb5f7cc3bcd6f8f37edf47fabb24349dd15b3a02329cd450f90a8d164bf4f8dfae554bf3b35a8a55b