Analysis
-
max time kernel
44s -
max time network
51s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
31/10/2024, 15:39
Static task
static1
Behavioral task
behavioral1
Sample
CLIENT.apk
Resource
android-33-x64-arm64-20240624-en
Errors
General
-
Target
CLIENT.apk
-
Size
3.4MB
-
MD5
e05f642a954e5fa5d06c56cf04c00b2d
-
SHA1
19d28d4f2677d6311ccc90c74806383931f2c0bc
-
SHA256
2bbe9cd94760ffe4f2ac5058343c25d7e9a24c5c678a1d3493999de2a5ea18dc
-
SHA512
e0f516e534619b727d4cf1508c5f7408e18f2ffe5a432c2393d7add17927bead273ad38fa08e8a53f996c8b2ee69500ff3f1cbe2daf96a417c0e3e4b037587ff
-
SSDEEP
49152:Yad2okaqMvh9/rY68za8sdWuDLA2LQm1cOdc/bpjgmVY2yocPKl65So:Rd2oPvHc/S+m11dc/b7Pcc655
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener cybershieldx.rainbow -
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS cybershieldx.rainbow -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo cybershieldx.rainbow -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo cybershieldx.rainbow
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24B
MD5913b846c56f868ac3a5669530ae35df0
SHA12454e0c278a3ddb777d4ad6fbeab57de99945064
SHA256d06f5ec259ac8c291096ce50ef2b9db1d1c26e82759cfe6825ef340c8a3b02c2
SHA51206911f6f0aa877f8a6271be54b7ca7f307f8434cd5a83591f6a8fcaed8b2823bbba5f3b5d94378a70006fb1bdda24b9dbe00e6ff1650096fa02d11b0f7ea0dd6
-
Filesize
8B
MD50ca08c6375d9e4dffaf644d6bc2ddc94
SHA10b2e8a345a85db370809ae7dd90199f66fc0ecf0
SHA25635dd951abacea82409f3971b0cfd6194d5b1b8ed5affa363aa1916fe435631e1
SHA512a86a454dd9249e010a34c1e64d308630d903abd92f3cccd7ba5d4c39bfd0d519319ab4788c7b19f904d74dec7396467af2827e03ffe96a71293f53fc826c5251
-
Filesize
3KB
MD510f66da999d8e7ad9dd369a680e789f6
SHA1da5c0229a460ff7bc102d80162cb3ff63a4bb11c
SHA25649058d3a71265a31f0a7de57525a42d11ef506a481caedc139233c59641c0e07
SHA512abed2c8895ec1f139149049ceeca039dc0e47295bafb46dd1abef94c35324a695a99870a613470c584c5dcba6e1ab81690308721e09709f3d9b10ce24be84174