Analysis
-
max time kernel
46s -
max time network
142s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
07-11-2024 18:46
Static task
static1
Behavioral task
behavioral1
Sample
55975d0e6d18977989082f6ad9a1a2b8.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
55975d0e6d18977989082f6ad9a1a2b8.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
55975d0e6d18977989082f6ad9a1a2b8.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
55975d0e6d18977989082f6ad9a1a2b8.apk
-
Size
11.3MB
-
MD5
55975d0e6d18977989082f6ad9a1a2b8
-
SHA1
de1d5721fdec218a3a2cb30df96a3f850dcaae26
-
SHA256
a880d496b35844ec1d2449576898f4834ba48fbb6a809677e9c9a193195ef84f
-
SHA512
dd80e9c26dd4308d527fae4e59eaa1c76d81f8e9ccf5aaff27a28b2bdd18df99d28e378bf33006609794ca1034ad5b3ae642120e2c4d41aceeb2e9a3243cdc84
-
SSDEEP
196608:VHSzCnRoHOSS6bYVCGSdmsjEO/LvsPSf+0X6gyurpVMCERdP26vUGqFv5:VHS6RmS6YcGilIwsPSf+b8VmdP2/GqT
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
comhxhd.icdgdbdhdgic.apqDhdgdsgndescription ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener comhxhd.icdgdbdhdgic.apqDhdgdsgn -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
comhxhd.icdgdbdhdgic.apqDhdgdsgndescription ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone comhxhd.icdgdbdhdgic.apqDhdgdsgn -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
comhxhd.icdgdbdhdgic.apqDhdgdsgndescription ioc Process Framework service call android.app.IActivityManager.registerReceiver comhxhd.icdgdbdhdgic.apqDhdgdsgn -
Checks CPU information 2 TTPs 1 IoCs
Processes:
comhxhd.icdgdbdhdgic.apqDhdgdsgndescription ioc Process File opened for read /proc/cpuinfo comhxhd.icdgdbdhdgic.apqDhdgdsgn -
Checks memory information 2 TTPs 1 IoCs
Processes:
comhxhd.icdgdbdhdgic.apqDhdgdsgndescription ioc Process File opened for read /proc/meminfo comhxhd.icdgdbdhdgic.apqDhdgdsgn
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24B
MD5ae4bfb0085c16aa1fe28cb622d123a85
SHA1a763524eb5b7b2a02c9781d11fb657566cfeb48d
SHA2567a84b51b9860fbbc71b45887f2ec833ddcbff859cfdf2b6ba2c56d9cd66dad96
SHA51276b0f66433bbaa29dc83ab60e82dccd4fcf3bc4f313f90869c5782edc359678c4b36f57ce5364cc785f07d7fc3c844bba5cc5faf5f95a80042e7ed6c20e04d94
-
Filesize
17KB
MD5c714fe9af9808aaa96beb01d758e14ba
SHA1d35d8e3f34f1bc0be9dd03d402587cf0aa794f8b
SHA25665698adf857021a3ae31aee9783afb21ae903104e0cb2d339d009618712f0485
SHA512578e4ef59fd72465da42abc829e3bff48727eebc0c0ce5d9024d7327c4e73dee3d7aa685f957044c426e4afc40b877077b7b2120ee00e0dfddb086800bcc72e5