Analysis
-
max time kernel
54s -
max time network
67s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
09-11-2024 09:55
Static task
static1
Behavioral task
behavioral1
Sample
A.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
A.apk
-
Size
4.5MB
-
MD5
6f8abab6674051b497df0e353c016042
-
SHA1
dbbaa24642428940e4be27220257139498903c0e
-
SHA256
e62d68ab13afd961ac3a7255130c5822b50cc5a0b6a7f80cceb46e217f3a95aa
-
SHA512
080368356ef2d335fb5be3959fd4179048923aa4b9884138278b4c575e3de169311c3187595386ff5bb230e3655cc1d287d69974ab28f48667f44f1fa34dcc94
-
SSDEEP
98304:C6oBlH46VorswqTgw7xY8gPiXNJzjPNmtHK0BPWet70dNO42EYuDjA:446VaCgg2FPiXzzRmtBPFt7CND2RuDjA
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
web.browserdescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener web.browser -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
web.browserdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone web.browser -
Reads information about phone network operator. 1 TTPs
-
Checks CPU information 2 TTPs 1 IoCs
Processes:
web.browserdescription ioc process File opened for read /proc/cpuinfo web.browser -
Checks memory information 2 TTPs 1 IoCs
Processes:
web.browserdescription ioc process File opened for read /proc/meminfo web.browser
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD56476cb5e643ade61be63ca083f13501f
SHA143dcb47df77b63833b7941a241409e48d2a34118
SHA256f08da305cd1f8b90b47cb03f34871343ef473b3c297298e99767ebcde7642072
SHA512d06f2b8deaa47f2bb256775dacf5e29b5e0346a627beeba4718dd3cbaededdff09c553091d30716c4d7362c8d53e5468236c2a4e0bf568bf39f62f9764d5b3ed
-
Filesize
512B
MD5a21cc65e6d1dac307ece1ce04cb8f942
SHA17dc942f9571b932cdc94bdbb6fcfd1f7d679c74c
SHA256b2c7688b1a000b2c341186716106dfac5020e1f78ec7932149dc61eee492ca02
SHA5123007d6af06ed32271761ccbb4685924bd4398f8fce456528c591005945e81d54b036ff423df67159f44b47a5aecbb1d2f734e1fb9d660b1d35a87e34e5619922
-
Filesize
8KB
MD5ed08721ac070480c59aab2d42e818fce
SHA13b23eb84bfff52abdc86ebbd6f2aaf603520cd15
SHA256bf89bd8d62ed17a5d4b91bc999dae70fbf9bc9fe932b2fba9d2bfac1db0629a8
SHA512f8774195140f022e3f8adda66b234db248993ee0b15fd33a001a2e9343d156fce58d973bd52852c3fadbb9584f9eb793051b0f0bb652772a242eed73edfd2bdc
-
Filesize
8KB
MD587b1244d58a26e8a5aa2aeabc75d7aea
SHA16c4647e8407d6ec1d6de1f1d96a9a64af1041070
SHA25605e64e516823903f08e9bb18b0c45415fc44bfc56d641f9dc2f6ab99aeff2e5a
SHA51285b2873e22c161476f38b631abae301cc764846486c004ca8f55c9658c2528455355f9c257bfe1d64634287cb01dc939500103f76a326756939fc63b6d3ba606
-
Filesize
16KB
MD58e586ca34758403edd25aebe18042dc0
SHA1e71001cfabc68821b3a0bdb83ee945e7464da638
SHA256e45e2ac1c037fe67e034fba540a370d65240ffd26835361b0b5ac0716005b607
SHA512a52fb9c238a642067d871257c00201316adb476dae56af6eb558809a5206621a253bb89cb6a29938cd286a5785ad6d3e7b12b3e8d5bdade8e7da0007caf7e968
-
Filesize
16KB
MD5950092045d1d577ec23d7e39cd76be3a
SHA139bfc880067e4c952ed26baea6bafa302d8fd969
SHA2569932b0391bff8da16d5e56233e6d9f7e59f4b7094e9bd658f77ae9a3d871fc62
SHA51201f3a200b3e2f60e2a4b0f4a74454a4801f574f3e93953141cbd12b5a59d412c595a9ae004b366f6ac3b3af19129dd276b9bc56b261d92616ceeed96d0238cbf
-
Filesize
12KB
MD51571470362d1a734b5cd30104553147e
SHA106335ba362ecfba46f44a6e035efef89afa2ac46
SHA2566e933c4508e8178612a557ad620ca488b7a0a17073dfd3876e6bca3f0c7fecb1
SHA512c2f8d39c705f123765b5eb3540195b2cf48d09649a536b4a3aee0f38df723d1a09679fb86aa1f496c537b8cb6c67ea9427ffb58ac6c7f124e0d376a8d7286bb7