Analysis
-
max time kernel
46s -
max time network
151s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
15/10/2024, 22:09
Static task
static1
Behavioral task
behavioral1
Sample
91f20226dea9b413b77d64f84169dce787a3d364f91c026a3b1ed532fffd3a5e.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
91f20226dea9b413b77d64f84169dce787a3d364f91c026a3b1ed532fffd3a5e.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
91f20226dea9b413b77d64f84169dce787a3d364f91c026a3b1ed532fffd3a5e.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
91f20226dea9b413b77d64f84169dce787a3d364f91c026a3b1ed532fffd3a5e.apk
-
Size
4.7MB
-
MD5
c1d04332247f185197b179ca05f0153c
-
SHA1
7fea8f133a697050e65d24f5b313ef3e88deb44f
-
SHA256
91f20226dea9b413b77d64f84169dce787a3d364f91c026a3b1ed532fffd3a5e
-
SHA512
053b46818b5c3d70343818b570d31a914c29f90700490e98743dd0f03cab9f1baf8cfc6aed3238439972f2d9e9aeb377937490283fb8fded7a1eee6043757c2d
-
SSDEEP
98304:xC1ql0NpWC1DiZnbln09tFXBF9JIzxuhW4vhPCk3fDKN4H4pw:xehNpgJ09Lvj1hTQkGw
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.google.myandroie -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.google.myandroie -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.google.myandroie -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.google.myandroie -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.google.myandroie
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5e1412928cd85d8434610be8f5d71f243
SHA1a92eed701a5ca7284abe3bc1b41622bc2ab7da09
SHA256e02897fb6ff4061727e4aa6c766e7a4c2f0b6caa3f27240824a751718351217e
SHA512f1ac5a59cac4403db2f6a9ea55250d803fd937213d51075a0974511a26be0b6ecbc79a1f9bfc3944b9f3a13e32f2f145aa8279623e818dcebce62fc916a869a2
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD596986aac8d35658b85ea5df9f9aac395
SHA1e18892e4a63af747756dc64667754441d3f8e914
SHA256e58366324ab598f5b2260805aa5431b4921a2a0fd98aa8c0a9190759232b92c3
SHA51200398a31ce6bbcf9266cd2d952846ffbe31a7133ae05171bea95c46353a0444e9fbcde22445e4cd99af1702c7f1044138f6dc7eaffb27be33772363af994549c
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD54377e5d0335f6af51d69c455c6767cbc
SHA13b127b8a85c2bd806ed4a69cf309178f3881fb64
SHA256f1263454012ea876a9bad27b4ceba495153f998ceaaf489cf48ded5c9c86fae0
SHA512fcbc51e31515febc15466f86de500c72c34913802e0cc04891938eca229457e71aa7b806ae64462753c6eb862660f5b2d6924d17f2c7e5de22d6a4f94f596152
-
Filesize
108KB
MD5bfe6eba52f49e110502c320be2c83c19
SHA1bcdc5fafa68e248f701fb884a973897725188332
SHA256fe83a9e7cdada6b3126eea76a27598707663244fb69a1398d633f3623505acb4
SHA51250004b48bfea36459b76fa780de2c16ceeba71d2e51839e436b8b96df71a89f80bfc09fc2e626cfd149083d015406f0bbd4cefb57363822fb95efeb1ebbe6470