Analysis
-
max time kernel
69s -
max time network
151s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
09/10/2024, 22:06
Static task
static1
Behavioral task
behavioral1
Sample
438c49423528b3c8128cb3b5573ebb3842b8e2599f6f2c26d7340f43421ab230.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
438c49423528b3c8128cb3b5573ebb3842b8e2599f6f2c26d7340f43421ab230.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
438c49423528b3c8128cb3b5573ebb3842b8e2599f6f2c26d7340f43421ab230.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
438c49423528b3c8128cb3b5573ebb3842b8e2599f6f2c26d7340f43421ab230.apk
-
Size
4.6MB
-
MD5
c3f18c10cebf482af245b4742e27bab8
-
SHA1
d976b80a2c90a43bf30e839da4755e84617affeb
-
SHA256
438c49423528b3c8128cb3b5573ebb3842b8e2599f6f2c26d7340f43421ab230
-
SHA512
35f3e3083226825533e2245c083876ad5245e29f4a59a8ae0f106c6412964c34d5dcbfdf15307c3e694999c44b0adb5508687957ecd3258ec5eeb03d2bbcbbbb
-
SSDEEP
98304:4VoOoZkQB/nDy+64oft0+u0MU+Ch1lGl8VteFio/KrURye:0oOCkQBfDyAoft0+3Vh1s0eF5ye
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.rating.kmlfeedback -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.rating.kmlfeedback -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.rating.kmlfeedback -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.rating.kmlfeedback -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.rating.kmlfeedback
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24B
MD5b494029db3d4fddbf91b3469bc4acb02
SHA12daff30eb8c07e63933a93add114a96020a12b0b
SHA2565cc0b74db360ffaf85611a43f50ecf273f0a1ead7b25b0c0a6585c49ed1319b1
SHA51267060c2d0f6b3154d61a1e75368efe3c6077e761266602a3ada1bab67fa36202b89c26a08fab2ce0b1d56ab850e1ed332030d342251c2b41b1d5925b2d1510d3
-
Filesize
8B
MD5b270c0920231e94ce95349de059597da
SHA1934d32896f421f323eed0622587e4dfed0cd0e73
SHA25684168ce6b242a524364fcb17beea6e2b392d5ebb991afe13f65b0d358a41f0c3
SHA51243bca9ac55244e0980a144348fab819d0b46d942e366cdedcda5badf5e4cac1188c190d987c125b9044a8907b58857f7556e7708321e368b8109b6d5be68e152
-
Filesize
2KB
MD5c13863934dc6b7244824b5b3de7b2ae2
SHA15d9a2f6afad75575c8d89300b38e82dafad89885
SHA2560dae6df411777105b7aa99672297596cdfc10bc84f14c13e8408cca7f8a94812
SHA512bf9fbdd540b9fab3c1db28c8ad43dcb5a8655060a30138ea448e7116b015596ae4e52187aab48f4cbe228159863b4330ca1b7d7ad6d04817bba724d63433486e
-
Filesize
4KB
MD522e07503e3b52f0c0eb6838e2530291a
SHA11c702aa934a539009e6605a0f08885c9d2263780
SHA256d52e43ce82f2ab7070588a76978d73b56e9966470c66b6fc75ebf1b8d031dfee
SHA512127e0e0a00a445bea24f0411cdb86c4a2ec8c801e3bbec7bc5ed567c39c6b092301933557d2f1079bc4efe68406015a3dc23976af12f3a91956a889879d095e1