Analysis
-
max time kernel
47s -
max time network
158s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
11-11-2024 16:26
Static task
static1
Behavioral task
behavioral1
Sample
Incredibox-Sprunki.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
Incredibox-Sprunki.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
Incredibox-Sprunki.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
Incredibox-Sprunki.apk
-
Size
8.2MB
-
MD5
1aefcf2ddeb7a9dd5ee0b8be18b0cfa4
-
SHA1
81b7097658f886d345ab8a458eccf1846d525dc9
-
SHA256
480202492f12938f93798c2ecbc4d68ffdb16aac0c644d63986f17180ae46538
-
SHA512
5ca3a92d1576a6ce6658bddb1b1ba238d1e21df53d1422111dfcdad9d80b79f81416fc21936d0430b3beede40c226207b680b90394919fbb27c7404a004c4d73
-
SSDEEP
196608:/vmOW2Cd6kt7DKRo/7usBbchRQ+ZTrv4vDQ+vk+4PJ:/vmARo/nBwRVZTb4Ltkb
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
co.median.android.leezlzdescription ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener co.median.android.leezlz -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
co.median.android.leezlzdescription ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone co.median.android.leezlz -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
co.median.android.leezlzdescription ioc Process Framework service call android.app.IActivityManager.registerReceiver co.median.android.leezlz -
Checks CPU information 2 TTPs 1 IoCs
Processes:
co.median.android.leezlzdescription ioc Process File opened for read /proc/cpuinfo co.median.android.leezlz -
Checks memory information 2 TTPs 1 IoCs
Processes:
co.median.android.leezlzdescription ioc Process File opened for read /proc/meminfo co.median.android.leezlz
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36B
MD53b4d6ac61c9abd2a3696a4e2ff5137a5
SHA1fc6fcb74885611349d926f1bc5e101b83af213e8
SHA25649bd3857e3540bb35caff8bc5a696358f98d0a12ec0438f27b41d893b5807d7f
SHA51291f14644b0a23aa8f05d1334511b891a52b1d819c2fc4227d802ae301c5634ea4d28ef230c1f1d80019477ccef38c494236632e104cf0deed97fffe008f49b0f
-
Filesize
1KB
MD5ad12f43961ab46511df5ddb2c0a8c139
SHA1d5202081c0033dc2a4147c97a5255ea5b6dc1a0f
SHA256537892617ffc701ff8c306ee15bac6f81c04d427d9df47eef137dc77882a2023
SHA512955eb641704a9de4bd934a928e5fa3af2fc24f840b27117038f650905e9c69509b9b7f42306419363d6bda5e9b04e57bf9ba84b2690bbda85ae20091799018ee
-
Filesize
24B
MD5b4c8594b561d2529ffc5f2cdf8f31193
SHA1eb46475beda099b201c61998cdfef9c99b29727e
SHA25619ff360238edff1a8950a2ddefced1577f8ef7149b5d42db140b6ea67d4e9433
SHA51267381a8696d5015f6078e168b5e8ce64042db1e3925fb2b7e60e1e8d6fb766b19d8f345dc6ec74b897dd1a732cd29cb51814b7afb2644ad0b8b3725d27fda77c
-
Filesize
8B
MD5b0fc025ffcaa1736a8208a1c5e256f94
SHA12d10a8a3e84e01e48f21f973ae90faaf154c8c3b
SHA2569e29a4c43539838a2e89bbc8ebcc7751b67999aa4a021e0e10eb550b4fb6f68d
SHA5128c495b30bc2c9627a837ffb0b0108df7140a06d920ceda20f4728a7857ac4cb60b27b7f3a000d7871a54d1ebfc72e4091fabecaddf6d54eefbed88bd5d6ad328
-
Filesize
2KB
MD53f5cfe4fc19be316d18a9c517f993ea8
SHA14a86c072ef020f6dd6dad7353e9ac09a55f0e385
SHA25648fef3acaefdf80aae362810301bf24016a0c499eaf4ef1fca14a8cb6e0b32e3
SHA512a98e4d143c92842ecaf448a17bc6aeb890bc239040663bc77bb844508d5e17375371ccfb8bd555342332a485062ed96b2eea207a129d4b6c07852080869222b4
-
Filesize
6KB
MD5c378e3fa0dc3d9d139c4503aafc3282e
SHA17c7f43fb7dfdafbcfd34221a505370c28ad4a341
SHA256bb3304d0aadf9aab6187a2861ef8996c11ca3df28da08f3fcec555a6a79ae4cc
SHA512cb9764d0b193dd4bdd6bdccc87d684f99ea4ea9a27173df61f6852cfa1c40cdb97e05106733163fdc9484a8319f14484c65eb5b73e0eecd26954ab094d5542b3