Analysis
-
max time kernel
87s -
max time network
152s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
14-11-2024 02:14
Behavioral task
behavioral1
Sample
262d3b4fd3a1e21ea2092cf93109512f4b241ea3a6da1b32555a69636bcc3cdf.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
262d3b4fd3a1e21ea2092cf93109512f4b241ea3a6da1b32555a69636bcc3cdf.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
262d3b4fd3a1e21ea2092cf93109512f4b241ea3a6da1b32555a69636bcc3cdf.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
262d3b4fd3a1e21ea2092cf93109512f4b241ea3a6da1b32555a69636bcc3cdf.apk
-
Size
7.3MB
-
MD5
aa59f02b4e95ee3fdd00ae55978deb4e
-
SHA1
3cd2fe989376cfe82a82ff6550586854c337d0b0
-
SHA256
262d3b4fd3a1e21ea2092cf93109512f4b241ea3a6da1b32555a69636bcc3cdf
-
SHA512
11566126fa01365eaf1cdef7bb5cdac9c1ffa0df7725395df4f4ee625b2acc1cb5f855bcca9be9960a63e57360387a06bbb1935ee45bb4318a729f68b6142b5b
-
SSDEEP
196608:3M0TBvJYqN0upHcjyZ/xrcme8Ty9GCLLmu0f3rsZit:hNNBpHcezAmeR0PQZit
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.mobincube.android.sc_3H3FLEioc pid Process /data/user/0/com.mobincube.android.sc_3H3FLE/[email protected] 4474 com.mobincube.android.sc_3H3FLE -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.mobincube.android.sc_3H3FLEdescription ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.mobincube.android.sc_3H3FLE -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.mobincube.android.sc_3H3FLEdescription ioc Process File opened for read /proc/cpuinfo com.mobincube.android.sc_3H3FLE -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.mobincube.android.sc_3H3FLEdescription ioc Process File opened for read /proc/meminfo com.mobincube.android.sc_3H3FLE
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/com.mobincube.android.sc_3H3FLE/[email protected]
Filesize3.2MB
MD5e078d5724ce1951610c1bf7cfc248651
SHA1c11ea6d9e5d2b29f84e394c1e262683dec28b950
SHA256cd93973550917ea1acc9683758d66ccd7f03b3401d26eb385b65613987cbe90d
SHA51257106f92ebfafce239639115a7eee5f19a1cdd31f7f4e94f3056e24cfe9d9e2494d055cfc250f248ac5595b4e84dd52eb288bda1e199599e27566d29dedca413
-
Filesize
1KB
MD5b43f137197add8ca6b7247166566701a
SHA15cf3158833100c89585e59bbfea1234b3b98ab8a
SHA25654e401eb590efbacb0691d19cdda01b6ffc3abdb1a30d3d7e0d9be5910246a52
SHA5124cd12c125fc15929f162d0e96f48780c1845c65aaab4b4b5975d7264ce269a5983a811e8e30ab97cd286fcb0bab7324c23dab2cb8c133619601e4c0bc257b6ae
-
/data/user/0/com.mobincube.android.sc_3H3FLE/oat/x86_64/[email protected]
Filesize601B
MD5a0d73ac3d834433c7314016fe6c3ec77
SHA18ef1ad22762a0832cd5ac8bbf5ffb082a9fb6ad3
SHA256962b25f807c1e847c983e09cca8cba9f69ce5b1f0e24754931211804a70e1f6d
SHA512b8651c112b52af4c9981333d978611f05bb5d574fb9b54496bd9050ea4c101a774722659ca4439f8a456eea5cb227ba6f2fdc7fa2f844b04c650bde12eccc644