Analysis Overview
SHA256
4e1e69a02c7a12d63c2cc66bfe005306716c42d29e64ef62f174f289b6f71176
Threat Level: Shows suspicious behavior
The file PM kisan benefit_1.0 (9)_.apk was found to be: Shows suspicious behavior.
Malicious Activity Summary
Obtains sensitive information copied to the device clipboard
Queries the mobile country code (MCC)
Requests disabling of battery optimizations (often used to enable hiding in the background).
Requests dangerous framework permissions
Registers a broadcast receiver at runtime (usually for listening for system events)
Checks CPU information
Checks memory information
MITRE ATT&CK
Mobile Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-12 13:31
Signatures
Requests dangerous framework permissions
| Description | Indicator | Process | Target |
| Allows an application to read SMS messages. | android.permission.READ_SMS | N/A | N/A |
| Allows financial apps to read filtered sms messages. | android.permission.SMS_FINANCIAL_TRANSACTIONS | N/A | N/A |
| Allows an application to receive SMS messages. | android.permission.RECEIVE_SMS | N/A | N/A |
| Allows an application to send SMS messages. | android.permission.SEND_SMS | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-12 13:31
Reported
2024-11-12 13:33
Platform
android-x86-arm-20240624-en
Max time kernel
25s
Max time network
133s
Command Line
Signatures
Queries the mobile country code (MCC)
| Description | Indicator | Process | Target |
| Framework service call | com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone | N/A | N/A |
Requests disabling of battery optimizations (often used to enable hiding in the background).
| Description | Indicator | Process | Target |
| Intent action | android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS | N/A | N/A |
Registers a broadcast receiver at runtime (usually for listening for system events)
| Description | Indicator | Process | Target |
| Framework service call | android.app.IActivityManager.registerReceiver | N/A | N/A |
Checks CPU information
| Description | Indicator | Process | Target |
| File opened for read | /proc/cpuinfo | N/A | N/A |
Checks memory information
| Description | Indicator | Process | Target |
| File opened for read | /proc/meminfo | N/A | N/A |
Processes
com.exa.hhkhkhkhk.jhkhkhkhk.jhkhkhkhkhk.mple.testttttv
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| GB | 142.250.187.202:443 | tcp | |
| US | 1.1.1.1:53 | semanticlocation-pa.googleapis.com | udp |
| US | 1.1.1.1:53 | airtelpaymentbank14.wixsite.com | udp |
| US | 34.144.206.118:443 | airtelpaymentbank14.wixsite.com | tcp |
| GB | 142.250.200.46:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 142.250.179.238:443 | android.apis.google.com | tcp |
Files
/data/data/com.exa.hhkhkhkhk.jhkhkhkhk.jhkhkhkhkhk.mple.testttttv/files/profileInstalled
| MD5 | 1350d93c76c9a70511beca55da36afb9 |
| SHA1 | 475edb59e3eb9ac5662acdafe215733bc8095d92 |
| SHA256 | 1dafde27b84806062f581222173eaa96dfd83f392efdb3c9a129d9d3df393ee5 |
| SHA512 | 1b57cc7ecc7f2cdebe2d8b256326f0bb85ecd76c70ed35e0e904596ed2466b0207350325d6cb0abaa908ea1f587330f8aa356b36194907d20844f96c6eab1123 |
Analysis: behavioral2
Detonation Overview
Submitted
2024-11-12 13:31
Reported
2024-11-12 13:33
Platform
android-x64-20240624-en
Max time kernel
49s
Max time network
157s
Command Line
Signatures
Obtains sensitive information copied to the device clipboard
| Description | Indicator | Process | Target |
| Framework service call | android.content.IClipboard.addPrimaryClipChangedListener | N/A | N/A |
Queries the mobile country code (MCC)
| Description | Indicator | Process | Target |
| Framework service call | com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone | N/A | N/A |
Registers a broadcast receiver at runtime (usually for listening for system events)
| Description | Indicator | Process | Target |
| Framework service call | android.app.IActivityManager.registerReceiver | N/A | N/A |
Checks CPU information
| Description | Indicator | Process | Target |
| File opened for read | /proc/cpuinfo | N/A | N/A |
Checks memory information
| Description | Indicator | Process | Target |
| File opened for read | /proc/meminfo | N/A | N/A |
Processes
com.exa.hhkhkhkhk.jhkhkhkhk.jhkhkhkhkhk.mple.testttttv
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| US | 1.1.1.1:53 | airtelpaymentbank14.wixsite.com | udp |
| US | 34.144.206.118:443 | airtelpaymentbank14.wixsite.com | tcp |
| US | 1.1.1.1:53 | ssl.google-analytics.com | udp |
| GB | 172.217.169.40:443 | ssl.google-analytics.com | tcp |
| GB | 142.250.187.238:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 142.250.178.14:443 | android.apis.google.com | tcp |
| GB | 142.250.179.228:443 | tcp | |
| GB | 142.250.179.228:443 | tcp | |
| GB | 216.58.212.206:443 | tcp | |
| GB | 142.250.200.2:443 | tcp |
Files
/data/data/com.exa.hhkhkhkhk.jhkhkhkhk.jhkhkhkhkhk.mple.testttttv/files/profileInstalled
| MD5 | 8bb551007b8dddcb2269c6195b3326a9 |
| SHA1 | 66881a340c1b4b1e2b86d6bd28efb96a804bb9f2 |
| SHA256 | b82411dc430e9285dcd4e5b1ade47948b4bdd12c39ad4c08427a8e8c7dcaf4cf |
| SHA512 | ea7321a94bcbce6222bbd9d878dbddbc173f3d7e239fe1a19cc77dc9652991537e20113917a67f524740b33c6797db916629d357d4e394358dfc7ac4cbf5c2e2 |
Analysis: behavioral3
Detonation Overview
Submitted
2024-11-12 13:31
Reported
2024-11-12 13:33
Platform
android-x64-arm64-20240624-en
Max time kernel
69s
Max time network
134s
Command Line
Signatures
Obtains sensitive information copied to the device clipboard
| Description | Indicator | Process | Target |
| Framework service call | android.content.IClipboard.addPrimaryClipChangedListener | N/A | N/A |
Requests disabling of battery optimizations (often used to enable hiding in the background).
| Description | Indicator | Process | Target |
| Intent action | android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS | N/A | N/A |
Checks CPU information
| Description | Indicator | Process | Target |
| File opened for read | /proc/cpuinfo | N/A | N/A |
Checks memory information
| Description | Indicator | Process | Target |
| File opened for read | /proc/meminfo | N/A | N/A |
Processes
com.exa.hhkhkhkhk.jhkhkhkhk.jhkhkhkhkhk.mple.testttttv
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| GB | 142.250.187.206:443 | tcp | |
| GB | 142.250.187.206:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 216.58.212.206:443 | android.apis.google.com | tcp |
| US | 1.1.1.1:53 | airtelpaymentbank14.wixsite.com | udp |
| US | 34.144.206.118:443 | airtelpaymentbank14.wixsite.com | tcp |
| US | 1.1.1.1:53 | ssl.google-analytics.com | udp |
| GB | 142.250.179.228:443 | tcp | |
| GB | 142.250.179.228:443 | tcp |