Analysis
-
max time kernel
111s -
max time network
132s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
16/10/2024, 22:30
Static task
static1
Behavioral task
behavioral1
Sample
ec8927344fdc09c66f4b45a5cba929d65b407742d54e532a29d37097d1107c9a.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
ec8927344fdc09c66f4b45a5cba929d65b407742d54e532a29d37097d1107c9a.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
ec8927344fdc09c66f4b45a5cba929d65b407742d54e532a29d37097d1107c9a.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
ec8927344fdc09c66f4b45a5cba929d65b407742d54e532a29d37097d1107c9a.apk
-
Size
4.5MB
-
MD5
896202fe4e3ef104fcfa1ddb8dc12bdc
-
SHA1
468e78a0f1d94dca6fac7988e88c15fad06d9d6f
-
SHA256
ec8927344fdc09c66f4b45a5cba929d65b407742d54e532a29d37097d1107c9a
-
SHA512
f0e510d70a49a50b8a343d7bca9d96c2d52221b13c26bfd6cc8d487cee4311337982b66ecd37e827ba53bcb3f0d38dc8bcd56c7ac7542e0143101618e92fba06
-
SSDEEP
98304:JM5Mv87MQ6NyJhq7E3iQqUjBYCvvUcxPmxKULGYqTGqWfrSV:SO8l5X/HdvvUcxP0KUJH5ro
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.rhmsoft.codeund9013 -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.rhmsoft.codeund9013 -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.rhmsoft.codeund9013
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD556a93b8a3611868738ebcc26b0edb28f
SHA1805823ae2522a998bd06289dd9586a5cd635eafb
SHA256274a2b3d7f0bc3f6dfc191dd028c96c50b69e48c243d97b40100dfc06d5a1844
SHA51248ad5037c22356a1f578f49c6ef0c588ad93b6d18238765af49febfd46894d8189d1af8cc725ab18b386f6b35aed7dfbb3bf5461d7b56d5af50153d6934d3f8d
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD5f8aea5fcd4b3f5e48b4e9e6e6c42714f
SHA1049ef64c140911fab18bfe01d1273984e07663e4
SHA256032e436896620f25a41a7c21cc19601734e4ec71d486f16085d7b8015a91da53
SHA5125727d9582bede38cf7f33ff01c7fc55941fee538391dbcd081776d1a52e05dfe1e26e37a9ccf19490cf5a64a3b6f536d07f6abf8b5cb92557195739f64300daa
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5debf63620112c722a7425f4476299da4
SHA1a2601b094df2a644deee61bfea56fc85b62e55cc
SHA2567b1a3955d2ef644e285a425a192f54cd51a86f37523459a5fccfb8f62f50574c
SHA512a1924baaf129f9b3ed8bfea289df4ccb826228de8c730b37818602e242de499b7aeed7a4945636b43b3bb4b91cca98f789ff054e86162ef367b4f8f92ca7dd0a
-
Filesize
108KB
MD5ea981857af89ac28e87607b381c9096d
SHA172d09e231f185fc36eb3159be75811d41b9f6344
SHA256f86009fdb51e15c1be34867c30c85048900bf773529bbc3271f1c7a959269b10
SHA5120627fd713345b45707092064ae7a102ed353d8f5b3f6cc0c4ff03c99a740c92eb0f7d163255671711fb7c0919ca38a30c6783e285f7857777417cdee4af38c3f