Analysis
-
max time kernel
36s -
max time network
156s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
14-11-2024 02:14
Behavioral task
behavioral1
Sample
262d3b4fd3a1e21ea2092cf93109512f4b241ea3a6da1b32555a69636bcc3cdf.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
262d3b4fd3a1e21ea2092cf93109512f4b241ea3a6da1b32555a69636bcc3cdf.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
262d3b4fd3a1e21ea2092cf93109512f4b241ea3a6da1b32555a69636bcc3cdf.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
262d3b4fd3a1e21ea2092cf93109512f4b241ea3a6da1b32555a69636bcc3cdf.apk
-
Size
7.3MB
-
MD5
aa59f02b4e95ee3fdd00ae55978deb4e
-
SHA1
3cd2fe989376cfe82a82ff6550586854c337d0b0
-
SHA256
262d3b4fd3a1e21ea2092cf93109512f4b241ea3a6da1b32555a69636bcc3cdf
-
SHA512
11566126fa01365eaf1cdef7bb5cdac9c1ffa0df7725395df4f4ee625b2acc1cb5f855bcca9be9960a63e57360387a06bbb1935ee45bb4318a729f68b6142b5b
-
SSDEEP
196608:3M0TBvJYqN0upHcjyZ/xrcme8Ty9GCLLmu0f3rsZit:hNNBpHcezAmeR0PQZit
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.mobincube.android.sc_3H3FLEioc pid process /data/user/0/com.mobincube.android.sc_3H3FLE/[email protected] 5067 com.mobincube.android.sc_3H3FLE -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.mobincube.android.sc_3H3FLEdescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.mobincube.android.sc_3H3FLE -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.mobincube.android.sc_3H3FLEdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.mobincube.android.sc_3H3FLE -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.mobincube.android.sc_3H3FLEdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.mobincube.android.sc_3H3FLE -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.mobincube.android.sc_3H3FLEdescription ioc process File opened for read /proc/cpuinfo com.mobincube.android.sc_3H3FLE -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.mobincube.android.sc_3H3FLEdescription ioc process File opened for read /proc/meminfo com.mobincube.android.sc_3H3FLE
Processes
-
com.mobincube.android.sc_3H3FLE1⤵
- Loads dropped Dex/Jar
- Obtains sensitive information copied to the device clipboard
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:5067
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b43f137197add8ca6b7247166566701a
SHA15cf3158833100c89585e59bbfea1234b3b98ab8a
SHA25654e401eb590efbacb0691d19cdda01b6ffc3abdb1a30d3d7e0d9be5910246a52
SHA5124cd12c125fc15929f162d0e96f48780c1845c65aaab4b4b5975d7264ce269a5983a811e8e30ab97cd286fcb0bab7324c23dab2cb8c133619601e4c0bc257b6ae
-
/data/data/com.mobincube.android.sc_3H3FLE/oat/x86_64/[email protected]
Filesize334B
MD5399b391405acf775cb44754dd7fbdf20
SHA1f0f9a7cc6ae3f3352c7f2dd72c4a1dbc63375fd6
SHA256afeafad6bd7678fc3db82a79f25a2c1a137232519044948fc18cf1d712ffb058
SHA51260231620e070b617ff458a0eea4677c0c01ab71204012db5d3f4a9b0cba5a28a5fa5cb5448138fb6ac3db2ed144a4d9609f32c0b59588f70318beafdc2f7d2c8
-
/data/user/0/com.mobincube.android.sc_3H3FLE/[email protected]
Filesize3.2MB
MD5e078d5724ce1951610c1bf7cfc248651
SHA1c11ea6d9e5d2b29f84e394c1e262683dec28b950
SHA256cd93973550917ea1acc9683758d66ccd7f03b3401d26eb385b65613987cbe90d
SHA51257106f92ebfafce239639115a7eee5f19a1cdd31f7f4e94f3056e24cfe9d9e2494d055cfc250f248ac5595b4e84dd52eb288bda1e199599e27566d29dedca413