Analysis
-
max time kernel
133s -
max time network
132s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
10-10-2024 11:12
Static task
static1
Behavioral task
behavioral1
Sample
Union Bank_1.0.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
Union Bank_1.0.apk
-
Size
1.8MB
-
MD5
e3d648c3f6e9fd72d2e55692fa6f7881
-
SHA1
25edb0f7a5e10e8aead526847622a2c8813afc2e
-
SHA256
065404394ac2c005b868dc1d1e268b4799d1269b860a1d4fd0be733543c6831d
-
SHA512
abacfdff0d78028bbe38051dca0c43caf067c596bf984215bef8e8ccedb848e017c353cef7d1d96996a690eaad7dfd60402855ad429f7d5f30a91d2a914e4f74
-
SSDEEP
24576:Amo/tCHZCv6oKP4GBqUpgjeLjIgSVUMhpwmQF1sIWttIW4BgnNIIlGMEAaW4aPCb:3o8HZRd7B8gSVXzw4BhzaW4ahGOA
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.lidhiyaonline.services -
Checks the presence of a debugger
-
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.lidhiyaonline.services -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.lidhiyaonline.services
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24B
MD5a92e884ef9c3013a773ab5bb87a4d215
SHA17fc849ce08e6d4d4335cfe3d6f767c81bf0f8610
SHA2564d369f115bd6203469c358b427a3f1f772b40bcb3517003f89f0da9825042203
SHA512edd03dc06eecf1c518cf1c31abb765a06a712b6ab96b0e4275fd33519a69263621cc127774dcf9fc4b9d71fb2795563798ce2374c22b9fce88b86b8e7426b27d
-
Filesize
8B
MD53d84df87cc27400c97e3ca5cba2eeede
SHA14ae1073081f7492e8dd2b84fb38ed625700ad9cf
SHA25613aa63784fe33f6205888a2e95b211dc32ac18c94097c46ee17b7b36a029b957
SHA51245dd057063143ce90498d42a4b70bc315839ed6a96da65a7d8f6e7a9e5ac129f3c474eb19ece694abbe2276e2463c522e8fa023cf112e6e396b1c33194f9f853
-
Filesize
1KB
MD5a68ea746e1e9dfede72282939a64d2fa
SHA1a1febad9401303524ad9db75fa1366a99c896ced
SHA256d13a473842b4efb7852718624058ad268da21ea023a9116b0999c9937dc4dbe4
SHA5123eb6b066df916752610d1002ef5ce881bc4cd64f1601b3d43d60138f965cd3cdad2ca5e7d57a1d44d22765178d22647bf27a9a3ee6b4815154b130d8ab53f1bf
-
Filesize
2KB
MD571b28cee48542c86e9e3059569c348b4
SHA1ca91b99265a8baca2ee06d57f5d17cbdb2a070dd
SHA256d875d107540a91a8a97bb78ea79eb40c3647ea072eacb2102ff4eb13bf74a484
SHA512d634725fc8bec7779869b94801fcb4737b6b55971155d2df53211f369d0d35958345962f530bf0975acf7756c0002653c34eb68770677e6ccb3d295507a6152b