Analysis
-
max time kernel
47s -
max time network
132s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
16/10/2024, 22:49
Static task
static1
Behavioral task
behavioral1
Sample
f6258dfebf8930497083743d81225b0a83b31c563def23e5e5b0037cd88b5559.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
f6258dfebf8930497083743d81225b0a83b31c563def23e5e5b0037cd88b5559.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
f6258dfebf8930497083743d81225b0a83b31c563def23e5e5b0037cd88b5559.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
f6258dfebf8930497083743d81225b0a83b31c563def23e5e5b0037cd88b5559.apk
-
Size
2.0MB
-
MD5
c562f1b3895369399ed72e3ad27f67df
-
SHA1
47afeeac5852533881325d3e5f226868c13e0333
-
SHA256
f6258dfebf8930497083743d81225b0a83b31c563def23e5e5b0037cd88b5559
-
SHA512
a3269fcadc2864d8d880126ba255a72eda0d6a721afbb4ede3890f1f437920e4278b824e0aadfd98e88bf25932b507b42f5d48c8d383f7a0f4c3e69ad8e724a6
-
SSDEEP
49152:P5iu6D7a//Sa62DxbZoYgWwd2ofrAN5wYNx:P5f6XaU2Drsd2ofrANeWx
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.example.brltop -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.example.brltop -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.example.brltop