Analysis
-
max time kernel
33s -
max time network
154s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
13-11-2024 17:57
Behavioral task
behavioral1
Sample
aumentar-memoria-ram-interna-copy-5-0-0.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
aumentar-memoria-ram-interna-copy-5-0-0.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
aumentar-memoria-ram-interna-copy-5-0-0.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
aumentar-memoria-ram-interna-copy-5-0-0.apk
-
Size
7.3MB
-
MD5
aa59f02b4e95ee3fdd00ae55978deb4e
-
SHA1
3cd2fe989376cfe82a82ff6550586854c337d0b0
-
SHA256
262d3b4fd3a1e21ea2092cf93109512f4b241ea3a6da1b32555a69636bcc3cdf
-
SHA512
11566126fa01365eaf1cdef7bb5cdac9c1ffa0df7725395df4f4ee625b2acc1cb5f855bcca9be9960a63e57360387a06bbb1935ee45bb4318a729f68b6142b5b
-
SSDEEP
196608:3M0TBvJYqN0upHcjyZ/xrcme8Ty9GCLLmu0f3rsZit:hNNBpHcezAmeR0PQZit
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.mobincube.android.sc_3H3FLEioc pid process /data/user/0/com.mobincube.android.sc_3H3FLE/[email protected] 4591 com.mobincube.android.sc_3H3FLE -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.mobincube.android.sc_3H3FLEdescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.mobincube.android.sc_3H3FLE -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.mobincube.android.sc_3H3FLEdescription ioc process File opened for read /proc/cpuinfo com.mobincube.android.sc_3H3FLE -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.mobincube.android.sc_3H3FLEdescription ioc process File opened for read /proc/meminfo com.mobincube.android.sc_3H3FLE
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/com.mobincube.android.sc_3H3FLE/[email protected]
Filesize3.2MB
MD5e078d5724ce1951610c1bf7cfc248651
SHA1c11ea6d9e5d2b29f84e394c1e262683dec28b950
SHA256cd93973550917ea1acc9683758d66ccd7f03b3401d26eb385b65613987cbe90d
SHA51257106f92ebfafce239639115a7eee5f19a1cdd31f7f4e94f3056e24cfe9d9e2494d055cfc250f248ac5595b4e84dd52eb288bda1e199599e27566d29dedca413
-
Filesize
1KB
MD5b43f137197add8ca6b7247166566701a
SHA15cf3158833100c89585e59bbfea1234b3b98ab8a
SHA25654e401eb590efbacb0691d19cdda01b6ffc3abdb1a30d3d7e0d9be5910246a52
SHA5124cd12c125fc15929f162d0e96f48780c1845c65aaab4b4b5975d7264ce269a5983a811e8e30ab97cd286fcb0bab7324c23dab2cb8c133619601e4c0bc257b6ae
-
/data/user/0/com.mobincube.android.sc_3H3FLE/oat/x86_64/[email protected]
Filesize601B
MD56824245ded4a66dac4b7410a85d3c80b
SHA13cddd57cbafdfb57fa4c6874bda96017d9f1f88f
SHA2561d0a0a894608a2523b257929d268ae3b5a0e256c7e00b5bba3a5455805a903e4
SHA512aba0abbfc3330d4a098eec9739d2411ec3f00c9e53e164d646afb6246760a86a533edc73f4e3d16564f2bbf42d342e71a7d0bb7f4273d6bc818f92e1f9241c51