Analysis
-
max time kernel
585s -
max time network
601s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
18/10/2024, 11:02
Static task
static1
Behavioral task
behavioral1
Sample
PM-KISHAN-YOJANA.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
PM-KISHAN-YOJANA.apk
-
Size
6.1MB
-
MD5
3291b7247556ab20bb3b0446a8969b3e
-
SHA1
b93273be847c12428b10a3913288bc30bd8d42b7
-
SHA256
d08024967a69d7c022b526354d294bbe951a5536389d765d89984630785e9c7f
-
SHA512
b6a2d756fd5b662f1bc9ee6bc9446108b495f87a39fc60a1fb99b2b093e9afa1d0b8d07573d595d3e34c70a86da46b2d25009d198cdb4282541477ae6df17f4e
-
SSDEEP
98304:boTYrPOXunyM3sGRJ5aNQwNP7E4KexG7ZYISJodHZFWMbPFrJWR+9d9CoCwnagw+:sXunyMcBNQwSn7Z1sJ+L9pCwDkRwj
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /system_ext/framework/androidx.window.extensions.jar 4331 com.devdhn.preresiver /system_ext/framework/androidx.window.extensions.jar 4331 com.devdhn.preresiver /system_ext/framework/androidx.window.sidecar.jar 4331 com.devdhn.preresiver /system_ext/framework/androidx.window.sidecar.jar 4331 com.devdhn.preresiver -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.devdhn.preresiver -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.devdhn.preresiver -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.devdhn.preresiver
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24B
MD5198071117c07edc7078765d7f68f9668
SHA1ada637b558c6c94d5d4af6d20fb808fd44cdfb65
SHA256dde7e02e99ecdf2898789fa600b57f6ca91366aa583f02b7d4c87e96e40eea85
SHA512a014b3f54fd6e2648d1719c5aa91210fea228317d810353b4f1650a8cebe9479b6f862c9616fe1cbfcb56555025c4bc8773154ded11a284129e5b11b67e0e932
-
Filesize
123KB
MD53056e1bdb7d4e19789d0319eff484bd0
SHA16791ae47aa9466fe0bca27ad6643f846853bbee4
SHA2568e6331a07c9f2ac139214c527dcaff2c82d126bbe7bd3420cdc36d6a8c9204b0
SHA512c790980fd68d9f89e32743bc28846807d5e5947c555f494de47714dec5cbd0c08d81c3260fa463759d1b17a953af3c44ec30b14fb08bf6b29db3837346c9f658
-
Filesize
25KB
MD529469324e59dfcc052f24b5af4e7b2c4
SHA110c1e17ac6f598037bb51baa07945663645de4eb
SHA2569195dc6a1c75a841384050240dfc972e48178964993fba6619788625f4b40d1a
SHA5125e27c2b1431369a248298f2f749136a575005584f9999f2a4c204a0c47adce2e33c8df9f058bdafa1bde1c99e46d175560cedfcddcd8581718ed1d9973c37cc2