Analysis
-
max time kernel
26s -
max time network
155s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
08/10/2024, 22:08
Static task
static1
Behavioral task
behavioral1
Sample
dc749f5d63107ae4bf3840523275122369bfefa1999bcb6f6a0810edbab516a1.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
dc749f5d63107ae4bf3840523275122369bfefa1999bcb6f6a0810edbab516a1.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
dc749f5d63107ae4bf3840523275122369bfefa1999bcb6f6a0810edbab516a1.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
dc749f5d63107ae4bf3840523275122369bfefa1999bcb6f6a0810edbab516a1.apk
-
Size
1.7MB
-
MD5
33045a8021ba5b03077867f2149960c1
-
SHA1
4b40938081c73710f90a8b849a5255bbc2c22c0d
-
SHA256
dc749f5d63107ae4bf3840523275122369bfefa1999bcb6f6a0810edbab516a1
-
SHA512
faa4f006bd5e86af48b5ae1889e6b7beaf83587465fa53c40e5825fad38f228257a97f00c160fe8aa693da2d64532f33db52dc71109a823c204c089259cc980f
-
SSDEEP
24576:T8KmO7FsKXZRWvz2WiSrO/Ul/eFCc1W4fBKK/gy6F/38DAuiXY:TMO1RWv1iSrOc9BIBB/gy6F/38MI
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.example.dsk -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.example.dsk -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.example.dsk
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8B
MD58e32a7ac916a7dcf24db70867a4d3d06
SHA15b77318602c53caa05550ed11fb7aaee9959bd91
SHA256418f429613971f6744921e784aae3aea99c4adee239429d8062f6a5c6011a2a3
SHA512685893332e333683a49d0aed28bc6c3d0c6e55def911fad4ee3f4c89b2d52c2e527b387bf50efa7eee0edf2bc044436843da385d1013747fc7ad7bdaedab998b
-
Filesize
1KB
MD58f9a34480ca863c32ef76520eadcf14e
SHA1d147f0fe8da17027f1e5cebee5e5d8e7dcafc453
SHA256bc70cc78e037b21ffa8eab418f4228b6319ecd41700c08c7a38496a5476d5b69
SHA512765833528492b4a2a81f1d7b453f1d1ff9ceb589fa56af3b44761c097c9f64537ea6db193b0e8bd77d48b6ad1e55c9444ca04dbe73c686bf23d9a574b60077df