Analysis
-
max time kernel
132s -
max time network
146s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
14-11-2024 10:42
Static task
static1
Behavioral task
behavioral1
Sample
Sinergram.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
Sinergram.apk
-
Size
8.6MB
-
MD5
808d91881107a1aad3a5ca657a216c3c
-
SHA1
613d2a9aed9fe2240a6cca537ad6361c99909a5d
-
SHA256
a946908f67ecd089ee34cc9aa89a9075de754d09e4bd2a82481fa029d8683fdc
-
SHA512
e02deb45782023e25487bff1e593724400018b7830e10165f711888a372f409a3010518a34da9faf491a0d5a297e55429e6a47986ed0a210e328ed606712bb00
-
SSDEEP
196608:g/fZpFcXuYUm01PAmsxEkCRbepJooHhp9bG790+fIFiufU/f80p:ufSeYO1PWEkCRCfthdmIFBcH8M
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.example.applicationdescription ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.example.application -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.example.applicationdescription ioc Process Framework API call javax.crypto.Cipher.doFinal com.example.application -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.example.applicationdescription ioc Process File opened for read /proc/meminfo com.example.application
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8B
MD5de33e97c38d39c62292c12ef4bcd8441
SHA1cd6cb4d540514121aa222dfa14d476cd6d76c745
SHA2562b052dba2ff88f68c4194bd6a4ccf1e8975d0432747fdb6d11d506a8abb565e8
SHA5126037d15c5bafdda90f30ad102fdc2835bd68d82db9960120b4b8fd381c829e5e28931398aba135ffe78e262d62453aeb3eb6b186583d908ef1703db68f599cfa
-
Filesize
6KB
MD531f034348980ff7afe3dcb170575e77b
SHA104b73895a2b31f1aecdc798a36d803559574b434
SHA25608e843b7fde86451d66bb0b4d41eb76ae12637f3d37310742e8b1f5c77d6f87a
SHA5123c265bac21c894c8fff73993575b5b88b1d9e5c98ef37f25714a623fe190525a0bef11b84d85a2d8fca9287be3934d805289f7e8eb29b35c1eb9a07962dafb88
-
Filesize
9KB
MD59e395f1833c45cd5dbc18b9e39417763
SHA1a0c4a49eb4cfec2ee71f6c8aadc8e7db8ce84016
SHA25648b485f849b9cdc93502d33a1b2587b3da8748aac825bf4343ddd41a70083ad8
SHA512b966a80151befe1fc19b69aa17c611d1a00c4e81ef3a188bb5d239e0b1636dd1e2d4846c1cf61f53f81b36cd929bcad8a271ba1c0d84e041b1a1a83e5ea428c7