Analysis Overview
SHA256
929f2d444be8d12c440c6521709280861068581cd2456f017de971f25e06e9d4
Threat Level: Shows suspicious behavior
The file Urge tm .apk was found to be: Shows suspicious behavior.
Malicious Activity Summary
Obtains sensitive information copied to the device clipboard
Queries the mobile country code (MCC)
Registers a broadcast receiver at runtime (usually for listening for system events)
Checks CPU information
Checks memory information
MITRE ATT&CK
Mobile Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-12 03:47
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-12 03:47
Reported
2024-11-12 03:51
Platform
android-x86-arm-20240910-en
Max time kernel
37s
Max time network
157s
Command Line
Signatures
Queries the mobile country code (MCC)
| Description | Indicator | Process | Target |
| Framework service call | com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone | N/A | N/A |
Registers a broadcast receiver at runtime (usually for listening for system events)
| Description | Indicator | Process | Target |
| Framework service call | android.app.IActivityManager.registerReceiver | N/A | N/A |
Checks CPU information
| Description | Indicator | Process | Target |
| File opened for read | /proc/cpuinfo | N/A | N/A |
Checks memory information
| Description | Indicator | Process | Target |
| File opened for read | /proc/meminfo | N/A | N/A |
Processes
com.sensitiveusername.utm
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| GB | 142.250.200.46:443 | tcp | |
| GB | 142.250.200.46:443 | tcp | |
| GB | 142.250.200.46:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 142.250.200.46:443 | android.apis.google.com | tcp |
| GB | 142.250.187.206:443 | tcp | |
| GB | 142.250.180.2:443 | tcp | |
| GB | 142.250.179.228:80 | tcp | |
| GB | 216.58.204.67:80 | tcp | |
| GB | 142.250.179.228:443 | tcp |
Files
/data/data/com.sensitiveusername.utm/files/chikannosyoudouif_sf.sav
| MD5 | 460eb59051b9c03848e786f10c650f80 |
| SHA1 | 1c6a60f3dd356989f038579fb7f92534cb07432f |
| SHA256 | 1d0374dc22e24a3f36fb24c1a9ea85a0f48573a7c03eadca27da6a0d08e440b3 |
| SHA512 | dfe0f80a13ade064dc4bf94ab2453f1aec5cf627344d81d94dfa5eec520e9cc0896930b94b8def814e001e68bbaa2717ad1035ab25856bc4bf1b20437a56662c |
/data/data/com.sensitiveusername.utm/files/chikannosyoudouif_sf.sav
| MD5 | ffaa92a905d9b210e67c51b6e9f7388b |
| SHA1 | 3b6d3d6fc5df5e430ab304490c4d78d9df6a9f67 |
| SHA256 | 626250e005e85d73f4e3630ecc7418ad71b34211c99c93fb89b4409ead149832 |
| SHA512 | ef1063283b6910abd9146f642c794993725c07ab4f7cd80121bb5d4791620670ab1cb9a8e41c3ecf9bcfafcf94081c62e81c0b18d3bdc53fab146f2ca1ffac7a |
Analysis: behavioral2
Detonation Overview
Submitted
2024-11-12 03:47
Reported
2024-11-12 03:50
Platform
android-x64-20240910-en
Max time kernel
141s
Max time network
129s
Command Line
Signatures
Obtains sensitive information copied to the device clipboard
| Description | Indicator | Process | Target |
| Framework service call | android.content.IClipboard.addPrimaryClipChangedListener | N/A | N/A |
Queries the mobile country code (MCC)
| Description | Indicator | Process | Target |
| Framework service call | com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone | N/A | N/A |
Registers a broadcast receiver at runtime (usually for listening for system events)
| Description | Indicator | Process | Target |
| Framework service call | android.app.IActivityManager.registerReceiver | N/A | N/A |
Checks CPU information
| Description | Indicator | Process | Target |
| File opened for read | /proc/cpuinfo | N/A | N/A |
Checks memory information
| Description | Indicator | Process | Target |
| File opened for read | /proc/meminfo | N/A | N/A |
Processes
com.sensitiveusername.utm
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| GB | 142.250.180.14:443 | tcp | |
| GB | 142.250.180.14:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 216.58.201.110:443 | android.apis.google.com | tcp |
| GB | 172.217.169.14:443 | tcp | |
| GB | 216.58.212.226:443 | tcp | |
| GB | 172.217.169.14:443 | tcp |
Files
/data/data/com.sensitiveusername.utm/files/chikannosyoudouif_sf.sav
| MD5 | 460eb59051b9c03848e786f10c650f80 |
| SHA1 | 1c6a60f3dd356989f038579fb7f92534cb07432f |
| SHA256 | 1d0374dc22e24a3f36fb24c1a9ea85a0f48573a7c03eadca27da6a0d08e440b3 |
| SHA512 | dfe0f80a13ade064dc4bf94ab2453f1aec5cf627344d81d94dfa5eec520e9cc0896930b94b8def814e001e68bbaa2717ad1035ab25856bc4bf1b20437a56662c |
/data/data/com.sensitiveusername.utm/files/chikannosyoudouif_sf.sav
| MD5 | ffaa92a905d9b210e67c51b6e9f7388b |
| SHA1 | 3b6d3d6fc5df5e430ab304490c4d78d9df6a9f67 |
| SHA256 | 626250e005e85d73f4e3630ecc7418ad71b34211c99c93fb89b4409ead149832 |
| SHA512 | ef1063283b6910abd9146f642c794993725c07ab4f7cd80121bb5d4791620670ab1cb9a8e41c3ecf9bcfafcf94081c62e81c0b18d3bdc53fab146f2ca1ffac7a |
Analysis: behavioral3
Detonation Overview
Submitted
2024-11-12 03:47
Reported
2024-11-12 03:51
Platform
android-x64-arm64-20240910-en
Max time kernel
47s
Max time network
156s
Command Line
Signatures
Obtains sensitive information copied to the device clipboard
| Description | Indicator | Process | Target |
| Framework service call | android.content.IClipboard.addPrimaryClipChangedListener | N/A | N/A |
Checks CPU information
| Description | Indicator | Process | Target |
| File opened for read | /proc/cpuinfo | N/A | N/A |
Checks memory information
| Description | Indicator | Process | Target |
| File opened for read | /proc/meminfo | N/A | N/A |
Processes
com.sensitiveusername.utm
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| GB | 172.217.169.14:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 142.250.200.46:443 | android.apis.google.com | tcp |
| US | 1.1.1.1:53 | www.youtube.com | udp |
| GB | 142.250.187.238:443 | www.youtube.com | tcp |
| GB | 142.250.200.46:443 | www.youtube.com | tcp |
| US | 216.239.32.223:443 | tcp | |
| US | 1.1.1.1:53 | ssl.google-analytics.com | udp |
| GB | 142.250.187.200:443 | ssl.google-analytics.com | tcp |
| GB | 142.250.187.193:443 | tcp | |
| GB | 142.250.187.225:443 | tcp | |
| US | 216.239.32.223:443 | tcp |
Files
/data/user/0/com.sensitiveusername.utm/files/chikannosyoudouif_sf.sav
| MD5 | 460eb59051b9c03848e786f10c650f80 |
| SHA1 | 1c6a60f3dd356989f038579fb7f92534cb07432f |
| SHA256 | 1d0374dc22e24a3f36fb24c1a9ea85a0f48573a7c03eadca27da6a0d08e440b3 |
| SHA512 | dfe0f80a13ade064dc4bf94ab2453f1aec5cf627344d81d94dfa5eec520e9cc0896930b94b8def814e001e68bbaa2717ad1035ab25856bc4bf1b20437a56662c |
/data/user/0/com.sensitiveusername.utm/files/chikannosyoudouif_sf.sav
| MD5 | ffaa92a905d9b210e67c51b6e9f7388b |
| SHA1 | 3b6d3d6fc5df5e430ab304490c4d78d9df6a9f67 |
| SHA256 | 626250e005e85d73f4e3630ecc7418ad71b34211c99c93fb89b4409ead149832 |
| SHA512 | ef1063283b6910abd9146f642c794993725c07ab4f7cd80121bb5d4791620670ab1cb9a8e41c3ecf9bcfafcf94081c62e81c0b18d3bdc53fab146f2ca1ffac7a |