Analysis
-
max time kernel
45s -
max time network
150s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
14/10/2024, 10:48
Static task
static1
Behavioral task
behavioral1
Sample
2c67b1ad9150364a8c23f07ed9bc396bc3c260ef531a883bba2c6766fe2c5ac5.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
2c67b1ad9150364a8c23f07ed9bc396bc3c260ef531a883bba2c6766fe2c5ac5.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
2c67b1ad9150364a8c23f07ed9bc396bc3c260ef531a883bba2c6766fe2c5ac5.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
2c67b1ad9150364a8c23f07ed9bc396bc3c260ef531a883bba2c6766fe2c5ac5.apk
-
Size
5.3MB
-
MD5
55bcf51946b21dbc2a37b153237a6644
-
SHA1
f18281166b5bcce8283b839d46b234d029531f9e
-
SHA256
2c67b1ad9150364a8c23f07ed9bc396bc3c260ef531a883bba2c6766fe2c5ac5
-
SHA512
cd6a81caf7a72c046f974d49acfc24d3d0d54fd006b4e024051168c06f3a355abc5f07e444bc6d38124362b54a57eaa41533a1c853345e91f0c70be63019718a
-
SSDEEP
98304:3PHRn431Qa4N6nUZrsXqaW+StZ1nLE9v0jzkGiqUngLCrutE:3J4FL4AUZrsaiSn1wMXk1qzE
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.android.applemall -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.android.applemall -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.android.applemall