Analysis
-
max time kernel
25s -
max time network
132s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
04/11/2024, 17:10
Static task
static1
Behavioral task
behavioral1
Sample
522721419887reward-icici.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
522721419887reward-icici.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
522721419887reward-icici.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
522721419887reward-icici.apk
-
Size
2.8MB
-
MD5
8149fb4c8427809ee48f100694b4caad
-
SHA1
2368ffd53de4b348c1d90e8d8a11972cc5b6d93a
-
SHA256
f2968b5db9f977e57984c8a6d264c49f237560371953e6e42a2a11bf45e08aab
-
SHA512
f75025222ca6bfb6f979bea4399fb26439e4cd92362bda0de1d51908f46bd664cf08982cd1ccb4877f68a41e0ffeac90a1f14155a13ba20151cbe0afedecea03
-
SSDEEP
49152:i77jtAMhapZAwqA9YvkEraHQu8w5ldxYa1xo1YDubEjwDTKpi9ARia4gFZ3GoB:+RA+IZAi9Y8Erawub5l0a1W1YDubEjwq
Malware Config
Signatures
-
Checks Android system properties for emulator presence. 1 TTPs 1 IoCs
description ioc Process Accessed system property key: ro.product.model com.ico.ickath -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.ico.ickath -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.ico.ickath -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.ico.ickath
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8B
MD57e3e38e9cda9b25f1c072fe3414c9911
SHA18f980601835d8d6b4f324de6bf6a57c87192a514
SHA2566f91037b0c8782344fae9d1303f462d44aee70ff633ebd3fcbbc2c36ca1f8d6a
SHA512c1e91a40dfb1aac3790a7a61a9c33b1d1672d2c20727604ba2fe49f710a4745a5a7ba65240c5ba1fc8a3a2e2d7892445891da98f90e29caaf84792b3b8b5b3c4
-
Filesize
1KB
MD56a19774d365d1ce49a3e5099067e574b
SHA1c350bdb6ad839ce4ee3f27e1af95f22f76f7e9e8
SHA256b1475084f7e71f8cb69355f28b1a1e2af8fe23dd878649607194ce130c0d2ed9
SHA5120d58a2fc604ff2c0773e5879f77f5ad49a4cbd651a5f7b6e8ffeba32cf03fa37027393aa0a4cfd7d6fe018742868c7d2798ce24c590db46e829e429dd8afcd4e